{"api_version":"1","generated_at":"2026-05-07T17:27:51+00:00","cve":"CVE-2018-16868","urls":{"html":"https://cve.report/CVE-2018-16868","api":"https://cve.report/api/cve/CVE-2018-16868.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-16868","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-16868"},"summary":{"title":"CVE-2018-16868","description":"A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2018-12-03 14:29:00","updated_at":"2022-11-30 21:20:00"},"problem_types":["CWE-203"],"metrics":[],"references":[{"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html","name":"openSUSE-SU-2019:1353","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2019:1353-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868","refsource":"CONFIRM","tags":["Issue Tracking","Third Party Advisory"],"title":"1654929 – (CVE-2018-16868) CVE-2018-16868 gnutls: Bleichenbacher-like side channel leakage in PKCS#1 v1.5 verification and padding oracle verification","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://cat.eyalro.net/","name":"http://cat.eyalro.net/","refsource":"MISC","tags":["Technical Description","Third Party Advisory"],"title":"Your browser does not support frames. We recommend upgrading your browser.","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html","name":"openSUSE-SU-2019:1477","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2019:1477-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/106080","name":"106080","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"GNU GnuTLS CVE-2018-16868 Information Disclosure Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-16868","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16868","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"16868","vulnerable":"1","versionEndIncluding":"3.6.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"gnutls","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2018-16868","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-203","cweId":"CWE-203"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"[UNKNOWN]","product":{"product_data":[{"product_name":"gnutls","version":{"version_data":[{"version_affected":"=","version_value":"n/a"}]}}]}}]}},"references":{"reference_data":[{"url":"http://cat.eyalro.net/","refsource":"MISC","name":"http://cat.eyalro.net/"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html"},{"url":"http://www.securityfocus.com/bid/106080","refsource":"MISC","name":"http://www.securityfocus.com/bid/106080"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868","refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868"}]},"impact":{"cvss":[{"attackComplexity":"HIGH","attackVector":"PHYSICAL","availabilityImpact":"NONE","baseScore":4.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N","version":"3.0"}]}},"nvd":{"publishedDate":"2018-12-03 14:29:00","lastModifiedDate":"2022-11-30 21:20:00","problem_types":["CWE-203"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N","attackVector":"PHYSICAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.6,"baseSeverity":"MEDIUM"},"exploitabilityScore":0.4,"impactScore":4.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:P/I:P/A:N","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.3},"severity":"LOW","exploitabilityScore":3.4,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*","versionEndIncluding":"3.6.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"16868","Ordinal":"133679","Title":"CVE-2018-16868","CVE":"CVE-2018-16868","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"16868","Ordinal":"1","NoteData":"A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"16868","Ordinal":"2","NoteData":"2018-12-03","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"16868","Ordinal":"3","NoteData":"2020-12-04","Type":"Other","Title":"Modified"}]}}}