Search for vulnerabilities
Vulnerability details: VCID-1gxv-1j1x-aaag
Vulnerability ID VCID-1gxv-1j1x-aaag
Aliases CVE-2019-1547
VC-OPENSSL-20190910-CVE-2019-1547
Summary Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
Status Published
Exploitability 0.5
Weighted Severity 7.0
Risk 3.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Low http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-1547.html
rhas Moderate https://access.redhat.com/errata/RHSA-2020:1336
rhas Moderate https://access.redhat.com/errata/RHSA-2020:1337
rhas Moderate https://access.redhat.com/errata/RHSA-2020:1840
cvssv3 5.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1547.json
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
epss 0.00433 https://api.first.org/data/v1/epss?cve=CVE-2019-1547
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1752090
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1549
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563
cvssv3 5.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 1.9 https://nvd.nist.gov/vuln/detail/CVE-2019-1547
cvssv3 4.7 https://nvd.nist.gov/vuln/detail/CVE-2019-1547
cvssv3.1 4.7 https://nvd.nist.gov/vuln/detail/CVE-2019-1547
generic_textual Low https://ubuntu.com/security/notices/USN-4376-1
generic_textual Low https://ubuntu.com/security/notices/USN-4376-2
generic_textual Low https://ubuntu.com/security/notices/USN-4504-1
generic_textual Low https://usn.ubuntu.com/usn/usn-4376-1
generic_textual Low https://usn.ubuntu.com/usn/usn-4376-2
generic_textual Low https://www.openssl.org/news/secadv/20190910.txt
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpuapr2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpuapr2020.html
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpujan2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpujan2020.html
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpujul2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpujul2020.html
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpuoct2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpuoct2020.html
cvssv3.1 9.8 https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
generic_textual CRITICAL https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
cvssv3.1 6.1 https://www.tenable.com/security/tns-2019-08
generic_textual MODERATE https://www.tenable.com/security/tns-2019-08
cvssv3.1 8.8 https://www.tenable.com/security/tns-2019-09
generic_textual HIGH https://www.tenable.com/security/tns-2019-09
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-1547.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1547.json
https://api.first.org/data/v1/epss?cve=CVE-2019-1547
https://arxiv.org/abs/1909.01785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/openssl/openssl/commit/21c856b75d81eff61aa63b4f036bb64a85bf6d46
https://github.com/openssl/openssl/commit/30c22fa8b1d840036b8e203585738df62a03cec8
https://github.com/openssl/openssl/commit/7c1709c2da5414f5b6133d00a03fc8c5bf996c7a
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=21c856b75d81eff61aa63b4f036bb64a85bf6d46
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30c22fa8b1d840036b8e203585738df62a03cec8
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=21c856b75d81eff61aa63b4f036bb64a85bf6d46
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30c22fa8b1d840036b8e203585738df62a03cec8
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://seclists.org/bugtraq/2019/Oct/0
https://seclists.org/bugtraq/2019/Oct/1
https://seclists.org/bugtraq/2019/Sep/25
https://security.gentoo.org/glsa/201911-04
https://security.netapp.com/advisory/ntap-20190919-0002/
https://security.netapp.com/advisory/ntap-20200122-0002/
https://security.netapp.com/advisory/ntap-20200416-0003/
https://security.netapp.com/advisory/ntap-20240621-0006/
https://support.f5.com/csp/article/K73422160?utm_source=f5support&amp%3Butm_medium=RSS
https://support.f5.com/csp/article/K73422160?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4376-2
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4376-2/
https://usn.ubuntu.com/4504-1/
https://usn.ubuntu.com/usn/usn-4376-1
https://usn.ubuntu.com/usn/usn-4376-2
https://www.debian.org/security/2019/dsa-4539
https://www.debian.org/security/2019/dsa-4540
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-08
https://www.tenable.com/security/tns-2019-09
1752090 https://bugzilla.redhat.com/show_bug.cgi?id=1752090
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
CVE-2019-1547 https://nvd.nist.gov/vuln/detail/CVE-2019-1547
RHSA-2020:1336 https://access.redhat.com/errata/RHSA-2020:1336
RHSA-2020:1337 https://access.redhat.com/errata/RHSA-2020:1337
RHSA-2020:1840 https://access.redhat.com/errata/RHSA-2020:1840
No exploits are available.
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1547.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-1547
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-1547
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-1547
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpuapr2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpujan2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpujul2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpuoct2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://www.tenable.com/security/tns-2019-08
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://www.tenable.com/security/tns-2019-09
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.46881
EPSS Score 0.00118
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.