Timing Side-Channel Vulnerability in SM2 Algorithm on 64-bit ARM Platforms by OpenSSL
CVE-2025-9231
6.5MEDIUM
What is CVE-2025-9231?
A timing side-channel vulnerability has been identified in the SM2 algorithm implementation on 64-bit ARM platforms, which may allow an attacker to recover the private key. Although the vulnerability has not been directly leveraged for remote key recovery, timing measurements indicate potential risks. While OpenSSL does not support SM2 keys in TLS by default, custom implementations could expose private keys to such timing attacks. The FIPS modules from versions 3.5 to 3.0 are not affected as SM2 is not recognized as an approved algorithm.
Affected Version(s)
OpenSSL 3.5.0 < 3.5.4
OpenSSL 3.4.0 < 3.4.3
OpenSSL 3.3.0 < 3.3.5
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Stanislav Fort (Aisle Research)
Stanislav Fort (Aisle Research)
Tomas Mraz