{"id":"CVE-2022-46392","details":"An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) can recover an RSA private key after observing the victim performing a single private-key operation, if the window size (MBEDTLS_MPI_WINDOW_SIZE) used for the exponentiation is 3 or smaller.","modified":"2026-04-09T09:05:31.898727Z","published":"2022-12-15T23:15:10.513Z","references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XMKJ5IMJEPXYAHHU56Z4P2FSYIEAESB/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/06/msg00034.html"},{"type":"ADVISORY","url":"https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2"},{"type":"ADVISORY","url":"https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/armmbed/mbedtls","events":[{"introduced":"0"},{"fixed":"89f040a5c938985c5f30728baed21e49d0846a53"},{"introduced":"8df2f8e7b9c7bb9390ac74bb7bace27edca81a2b"},{"fixed":"8c89224991adff88d53cd380f42a2baa36f91454"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.28.2"},{"introduced":"3.0.0"},{"fixed":"3.3.0"}]}},{"type":"GIT","repo":"https://github.com/mbed-tls/mbedtls","events":[{"introduced":"0"},{"fixed":"89f040a5c938985c5f30728baed21e49d0846a53"},{"fixed":"8c89224991adff88d53cd380f42a2baa36f91454"}]}],"versions":["beta-oob-2","mbedos-release-15-11","mbedos-techcon-oob2","mbedtls-2.0.0","mbedtls-2.1.0","mbedtls-2.1.1","mbedtls-2.1.2","mbedtls-2.10.0","mbedtls-2.11.0","mbedtls-2.12.0","mbedtls-2.13.0","mbedtls-2.13.1","mbedtls-2.14.0","mbedtls-2.16.0","mbedtls-2.19.0","mbedtls-2.19.0d1","mbedtls-2.19.0d2","mbedtls-2.19.1","mbedtls-2.2.0","mbedtls-2.2.1","mbedtls-2.20.0","mbedtls-2.20.0d0","mbedtls-2.21.0","mbedtls-2.22.0d0","mbedtls-2.24.0","mbedtls-2.26.0","mbedtls-2.3.0","mbedtls-2.4.0","mbedtls-2.5.0","mbedtls-2.5.1","mbedtls-2.6.0","mbedtls-2.6.0-rc1","mbedtls-2.7.0","mbedtls-2.7.0-rc1","mbedtls-2.8.0","mbedtls-2.8.0-rc1","mbedtls-2.9.0","polarssl-1.2.0","polarssl-1.2.1","polarssl-1.2.2","polarssl-1.2.4","polarssl-1.2.5","polarssl-1.2.6","polarssl-1.3.0","polarssl-1.3.0-rc0","polarssl-1.3.1","polarssl-1.3.2","polarssl-1.3.3","polarssl-1.3.4","polarssl-1.3.5","polarssl-1.3.6","polarssl-1.3.7","polarssl-1.3.8","polarssl-1.3.9","v2.24.0","v2.26.0","yotta-2.3.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-46392.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}]}