Timing Side-Channel Vulnerability in SM2 Algorithm on 64-bit ARM Platforms by OpenSSL
CVE-2025-9231
Currently unrated
What is CVE-2025-9231?
A timing side-channel vulnerability has been identified in the SM2 algorithm implementation on 64-bit ARM platforms, which may allow an attacker to recover the private key. Although the vulnerability has not been directly leveraged for remote key recovery, timing measurements indicate potential risks. While OpenSSL does not support SM2 keys in TLS by default, custom implementations could expose private keys to such timing attacks. The FIPS modules from versions 3.5 to 3.0 are not affected as SM2 is not recognized as an approved algorithm.
Affected Version(s)
OpenSSL 3.5.0 < 3.5.4
OpenSSL 3.4.0 < 3.4.3
OpenSSL 3.3.0 < 3.3.5