CVE-2023-49092:
Marvin Attack: potential key recovery through timing sidechannels
5.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.71812%
CWE
Published
11/28/2023
Updated
12/15/2023
KEV Status
No
Technology
Rust
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
rsa | rust | <= 0.9.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
- The GitHub issue #19 explicitly identifies rsa::internals::encrypt as showing variable timing behavior. 2. The Marvin Attack context suggests RSA primitive implementations (like modpow) are vulnerable. 3. Cryptographic literature shows modular exponentiation is a classic source of timing leaks. 4. The lack of patches indicates fundamental algorithm-level issues rather than specific helper functions. 5. The CWE-385 (Timing Channel) classification confirms this type of vulnerability pattern.