Timing Side-Channel Vulnerability in SM2 Algorithm on 64-bit ARM Platforms by OpenSSL
CVE-2025-9231

Currently unrated

Key Information:

Vendor

OpenSSL

Status
Vendor
CVE Published:
30 September 2025

What is CVE-2025-9231?

A timing side-channel vulnerability has been identified in the SM2 algorithm implementation on 64-bit ARM platforms, which may allow an attacker to recover the private key. Although the vulnerability has not been directly leveraged for remote key recovery, timing measurements indicate potential risks. While OpenSSL does not support SM2 keys in TLS by default, custom implementations could expose private keys to such timing attacks. The FIPS modules from versions 3.5 to 3.0 are not affected as SM2 is not recognized as an approved algorithm.

Affected Version(s)

OpenSSL 3.5.0 < 3.5.4

OpenSSL 3.4.0 < 3.4.3

OpenSSL 3.3.0 < 3.3.5

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Stanislav Fort (Aisle Research)
Stanislav Fort (Aisle Research)
Tomas Mraz
.
CVE-2025-9231 : Timing Side-Channel Vulnerability in SM2 Algorithm on 64-bit ARM Platforms by OpenSSL