CVE-2024-26306

Name
CVE-2024-26306
Description
iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
cve@mitre.org https://downloads.es.net/pub/iperf/esnet-secadv-2024-0001.txt.asc
cve@mitre.org https://github.com/esnet/iperf/releases/tag/3.17
cve@mitre.org https://www.insyde.com/security-pledge/SA-2024005
af854a3a-2127-422b-91ae-364da2661108 https://security.netapp.com/advisory/ntap-20250228-0007/
af854a3a-2127-422b-91ae-364da2661108 https://lists.debian.org/debian-lts-announce/2025/01/msg00027.html

Match rules

CPE URI Source package Min version Max version
n/a == n/a == n/a

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
iperf3 3.19-main 3.16-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable