Description
A flaw was found in openCryptoki. The openCryptoki Soft token does not check if an EC key is valid when an EC key is created via C_CreateObject, nor when C_DeriveKey is used with ECDH public data. This may allow a malicious user to extract the private key by performing an invalid curve attack.
References (4)
Core 4
Core References
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=1990591
Third Party Advisory x_refsource_misc
https://access.redhat.com/security/cve/CVE-2021-3798
Patch, Third Party Advisory x_refsource_misc
https://github.com/opencryptoki/opencryptoki/pull/402
Patch, Third Party Advisory x_refsource_misc
https://github.com/opencryptoki/opencryptoki/commit/4e3b43c3d8844402c04a66b55c6c940f965109f0
Scores
CVSS v3
5.5
EPSS
0.0015
EPSS Percentile
35.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-200
Status
published
Products (1)
opencryptoki_project/opencryptoki
< 3.17.0
Published
Aug 23, 2022
Tracked Since
Feb 18, 2026