Devolutions.XTS.NET Vulnerable to Timing Attack on GF Multiplications
Moderate severity
GitHub Reviewed
Published
Nov 27, 2024
in
Devolutions/XTS.NET
•
Updated Nov 27, 2024
Description
Published by the National Vulnerability Database
Nov 27, 2024
Published to the GitHub Advisory Database
Nov 27, 2024
Reviewed
Nov 27, 2024
Last updated
Nov 27, 2024
Impact
Timing attacks on Galois Field multiplications in this package. Successful exploitation would effectively allow a downgrade of the security guarantees of the XTS mode to the security guarantees of ECB mode, allowing block swapping, enabling identification of identical blocks, and rendering half of the XTS key obsolete. Timing attacks require specific conditions to be exploitable.
Patches
Patched in 2024.11.26
Workarounds
Upgrade the package
References
https://en.wikipedia.org/wiki/Timing_attack
References