EUVD-2025-18430

| CVE-2025-27587 MEDIUM
2025-06-16 [email protected]
5.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 14, 2026 - 21:59 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 21:59 euvd
EUVD-2025-18430
CVE Published
Jun 16, 2025 - 22:15 nvd
MEDIUM 5.3

Description

OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable to a Minerva attack, exploitable by measuring the time of signing of random messages using the EVP_DigestSign API, and then using the private key to extract the K value (nonce) from the signatures. Next, based on the bit size of the extracted nonce, one can compare the signing time of full-sized nonces to signatures that used smaller nonces, via statistical tests. There is a side-channel in the P-364 curve that allows private key extraction (also, there is a dependency between the bit size of K and the size of the side channel). NOTE: This CVE is disputed because the OpenSSL security policy explicitly notes that any side channels which require same physical system to be detected are outside of the threat model for the software. The timing signal is so small that it is infeasible to be detected without having the attacking process running on the same physical system.

Analysis

A security vulnerability in OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Technical Context

Vulnerability type not specified by vendor. Affects OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture.

Affected Products

['OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture']

Remediation

Monitor vendor channels for patch availability.

Priority Score

27
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +26
POC: 0

Vendor Status

Ubuntu

Priority: Low
openssl1.0
Release Status Version
jammy DNE -
noble DNE -
oracular DNE -
plucky DNE -
upstream needs-triage -
questing DNE -
bionic not-affected 3.x only
nodejs
Release Status Version
trusty not-affected uses system openssl
focal not-affected uses system openssl
noble not-affected uses system openssl
oracular not-affected uses system openssl
plucky not-affected uses system openssl
upstream needs-triage -
bionic ignored disputed by OpenSSL develpers
jammy ignored disputed by OpenSSL develpers
xenial ignored disputed by OpenSSL develpers
questing not-affected uses system openssl
edk2
Release Status Version
upstream needs-triage -
oracular ignored end of life, was needs-triage
bionic not-affected powerpc only
focal not-affected powerpc only
jammy not-affected powerpc only
noble not-affected powerpc only
plucky not-affected powerpc only
xenial not-affected powerpc only
questing not-affected powerpc only
openssl
Release Status Version
oracular ignored end of life, was needs-triage
plucky not-affected 3.4.1-1ubuntu3
bionic not-affected 3.x only
focal not-affected 3.x only
jammy ignored disputed by OpenSSL develpers
noble ignored disputed by OpenSSL develpers
upstream released 3.4.2,3.5.0
questing not-affected 3.5.2-1ubuntu1
trusty not-affected 3.x only
xenial not-affected 3.x only

Debian

openssl
Release Status Fixed Version Urgency
bullseye vulnerable 1.1.1w-0+deb11u1 -
bullseye (security) vulnerable 1.1.1w-0+deb11u5 -
bookworm vulnerable 3.0.18-1~deb12u1 -
bookworm (security) vulnerable 3.0.18-1~deb12u2 -
trixie fixed 3.5.5-1~deb13u1 -
trixie (security) fixed 3.5.4-1~deb13u2 -
forky fixed 3.5.5-1 -
sid fixed 3.6.1-2 -
(unstable) fixed 3.5.0-1 unimportant

Share

EUVD-2025-18430 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy