{"id":"CVE-2018-0497","details":"ARM mbed TLS before 2.12.0, before 2.7.5, and before 2.1.14 allows remote attackers to achieve partial plaintext recovery (for a CBC based ciphersuite) via a timing-based side-channel attack. This vulnerability exists because of an incorrect fix (with a wrong SHA-384 calculation) for CVE-2013-0169.","modified":"2026-04-09T05:58:46.112123Z","published":"2018-07-28T17:29:00.240Z","related":["MGASA-2018-0432"],"references":[{"type":"WEB","url":"https://usn.ubuntu.com/4267-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4296"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00029.html"},{"type":"ADVISORY","url":"https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-02"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/armmbed/mbedtls","events":[{"introduced":"0"},{"fixed":"2f7f2b1f1149e9cee5132afa88337df32436847c"},{"introduced":"8254ed2a9fadede8c6bf414072f78fc78d5af61c"},{"fixed":"5ef42fd415a1ce034b2107980f7cd8a68ff294dd"},{"introduced":"8be0e6db41b4a085e90cb03983f99d3a5158d450"},{"fixed":"6c34268e203d23bbfbfda3f7362dac8b9b9382bc"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.1.14"},{"introduced":"2.2.0"},{"fixed":"2.7.5"},{"introduced":"2.8.0"},{"fixed":"2.12.0"}]}}],"versions":["beta-oob-2","mbedos-release-15-11","mbedtls-2.0.0","mbedtls-2.1.0","mbedtls-2.1.1","mbedtls-2.1.10","mbedtls-2.1.11","mbedtls-2.1.11-rc1","mbedtls-2.1.12","mbedtls-2.1.13","mbedtls-2.1.2","mbedtls-2.1.3","mbedtls-2.1.4","mbedtls-2.1.5","mbedtls-2.1.6","mbedtls-2.1.8","mbedtls-2.1.9","mbedtls-2.1.9-rc1","mbedtls-2.10.0","mbedtls-2.11.0","mbedtls-2.2.0","mbedtls-2.2.1","mbedtls-2.3.0","mbedtls-2.4.0","mbedtls-2.5.0","mbedtls-2.5.1","mbedtls-2.6.0","mbedtls-2.6.0-rc1","mbedtls-2.7.0","mbedtls-2.7.0-rc1","mbedtls-2.7.1","mbedtls-2.7.2","mbedtls-2.7.2-rc1","mbedtls-2.7.3","mbedtls-2.7.4","mbedtls-2.8.0","mbedtls-2.9.0","polarssl-1.2.0","polarssl-1.2.1","polarssl-1.2.2","polarssl-1.2.4","polarssl-1.2.5","polarssl-1.2.6","polarssl-1.3.0","polarssl-1.3.0-rc0","polarssl-1.3.1","polarssl-1.3.2","polarssl-1.3.3","polarssl-1.3.4","polarssl-1.3.5","polarssl-1.3.6","polarssl-1.3.7","polarssl-1.3.8","polarssl-1.3.9","yotta-2.3.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-0497.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}