{"api_version":"1","generated_at":"2026-05-13T02:11:29+00:00","cve":"CVE-2014-3591","urls":{"html":"https://cve.report/CVE-2014-3591","api":"https://cve.report/api/cve/CVE-2014-3591.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2014-3591","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2014-3591"},"summary":{"title":"CVE-2014-3591","description":"Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2019-11-29 22:15:00","updated_at":"2019-12-05 18:06:00"},"problem_types":["CWE-200"],"metrics":[],"references":[{"url":"https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html","name":"https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html","refsource":"MISC","tags":["Patch","Vendor Advisory"],"title":"[Announce] Libgcrypt 1.6.3 released (with SCA fix)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.cs.tau.ac.il/~tromer/radioexp/","name":"http://www.cs.tau.ac.il/~tromer/radioexp/","refsource":"MISC","tags":["Third Party Advisory"],"title":"Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2015/dsa-3185","name":"http://www.debian.org/security/2015/dsa-3185","refsource":"MISC","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-3185-1 libgcrypt11","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html","name":"https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html","refsource":"MISC","tags":["Patch","Release Notes","Vendor Advisory"],"title":"[Announce] GnuPG 1.4.19 released (with SCA fix)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2015/dsa-3184","name":"http://www.debian.org/security/2015/dsa-3184","refsource":"MISC","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-3184-1 gnupg","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2014-3591","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3591","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2014","cve_id":"3591","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3591","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3591","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3591","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3591","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnupg","cpe5":"gnupg","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3591","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnupg","cpe5":"gnupg","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3591","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnupg","cpe5":"libgcrypt","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3591","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnupg","cpe5":"libgcrypt","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2014-3591","qid":"296059","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 36.0.1.101.2 Missing (CPUJUL2021)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2014-3591","STATE":"PUBLIC"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Other"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"GNU","product":{"product_data":[{"product_name":"Libgcrypt","version":{"version_data":[{"version_value":"before 1.6.3"}]}},{"product_name":"GnuPG","version":{"version_data":[{"version_value":"before 1.4.19"}]}}]}}]}},"references":{"reference_data":[{"refsource":"MISC","name":"http://www.cs.tau.ac.il/~tromer/radioexp/","url":"http://www.cs.tau.ac.il/~tromer/radioexp/"},{"refsource":"MISC","name":"https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html","url":"https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html"},{"refsource":"MISC","name":"https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html","url":"https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html"},{"refsource":"MISC","name":"http://www.debian.org/security/2015/dsa-3184","url":"http://www.debian.org/security/2015/dsa-3184"},{"refsource":"MISC","name":"http://www.debian.org/security/2015/dsa-3185","url":"http://www.debian.org/security/2015/dsa-3185"}]}},"nvd":{"publishedDate":"2019-11-29 22:15:00","lastModifiedDate":"2019-12-05 18:06:00","problem_types":["CWE-200"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"PHYSICAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.2,"baseSeverity":"MEDIUM"},"exploitabilityScore":0.5,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:P/I:N/A:N","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":1.9},"severity":"LOW","exploitabilityScore":3.4,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.19","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*","versionEndExcluding":"1.6.3","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2014","CveId":"3591","Ordinal":"70544","Title":"CVE-2014-3591","CVE":"CVE-2014-3591","Year":"2014"},"notes":[{"CveYear":"2014","CveId":"3591","Ordinal":"1","NoteData":"Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.","Type":"Description","Title":null},{"CveYear":"2014","CveId":"3591","Ordinal":"2","NoteData":"2019-11-29","Type":"Other","Title":"Published"},{"CveYear":"2014","CveId":"3591","Ordinal":"3","NoteData":"2019-11-29","Type":"Other","Title":"Modified"}]}}}