CVE-2021-3798

MEDIUM

openCryptoki - Memory Corruption

Title source: llm
STIX 2.1

Description

A flaw was found in openCryptoki. The openCryptoki Soft token does not check if an EC key is valid when an EC key is created via C_CreateObject, nor when C_DeriveKey is used with ECDH public data. This may allow a malicious user to extract the private key by performing an invalid curve attack.

References (4)

Core 4
Core References
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=1990591
Third Party Advisory x_refsource_misc
https://access.redhat.com/security/cve/CVE-2021-3798
Patch, Third Party Advisory x_refsource_misc
https://github.com/opencryptoki/opencryptoki/pull/402

Scores

CVSS v3 5.5
EPSS 0.0015
EPSS Percentile 35.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-200
Status published
Products (1)
opencryptoki_project/opencryptoki < 3.17.0
Published Aug 23, 2022
Tracked Since Feb 18, 2026