Timing Side-Channel Vulnerability in SM2 Algorithm on 64-bit ARM Platforms by OpenSSL
CVE-2025-9231
What is CVE-2025-9231?
A timing side-channel vulnerability has been identified in the SM2 algorithm implementation on 64-bit ARM platforms, which may allow an attacker to recover the private key. Although the vulnerability has not been directly leveraged for remote key recovery, timing measurements indicate potential risks. While OpenSSL does not support SM2 keys in TLS by default, custom implementations could expose private keys to such timing attacks. The FIPS modules from versions 3.5 to 3.0 are not affected as SM2 is not recognized as an approved algorithm.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
OpenSSL 3.5.0 < 3.5.4
OpenSSL 3.4.0 < 3.4.3
OpenSSL 3.3.0 < 3.3.5
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved