Miggo Logo

GHSA-4grx-2x9w-596c: Marvin Attack: potential key recovery through timing sidechannels

5.9

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
11/28/2023
Updated
12/14/2023
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
rsarust<= 0.9.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The advisory and linked GitHub issue #19 specifically identify timing variations in rsa::internals::encrypt() through fuzzing tests. The function's role in RSA encryption/decryption operations makes it a prime candidate for key-related timing leaks. While modpow implementations are often vulnerable in RSA timing attacks, the provided evidence directly points to encrypt() as the measured vulnerable function. The confidence is high due to reproducible timing differences and explicit mention in the issue discussion.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** [M*rvin *tt**k] is * timin* si*****nn*l vuln*r**ility w*i** *llows p*r*ormin* RS* ***ryption *n* si*nin* op*r*tions *s *n *tt**k*r wit* t** **ility to o*s*rv* only t** tim* o* t** ***ryption op*r*tion p*r*orm** wit*t** priv*t* k*y. * r***nt surv

Reasoning

T** **visory *n* link** *it*u* issu* #** sp**i*i**lly i**nti*y timin* v*ri*tions in `rs*::int*rn*ls::*n*rypt()` t*rou** *uzzin* t*sts. T** *un*tion's rol* in RS* *n*ryption/***ryption op*r*tions m*k*s it * prim* **n*i**t* *or k*y-r*l*t** timin* l**ks