CVE-2023-0361
📋 TL;DR
This CVE describes a timing side-channel vulnerability in GnuTLS that allows attackers to perform Bleichenbacher-style attacks against RSA encryption. By sending specially crafted messages to vulnerable servers, attackers can potentially recover RSA private keys and decrypt TLS session data. Any system using affected GnuTLS versions for TLS/SSL connections is vulnerable.
💻 Affected Systems
- GnuTLS
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Attackers decrypt all TLS traffic between clients and servers, compromising sensitive data including credentials, financial information, and communications.
Likely Case
Targeted attacks against high-value systems where attackers invest significant resources to perform the timing analysis and send large volumes of crafted messages.
If Mitigated
With proper patching and network controls, the risk is minimal as the attack requires substantial effort and network access.
🎯 Exploit Status
Attack requires sending millions of specially crafted messages and precise timing measurements, making it resource-intensive but feasible for determined attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: GnuTLS 3.7.9, 3.8.1, or later
Vendor Advisory: https://access.redhat.com/security/cve/CVE-2023-0361
Restart Required: Yes
Instructions:
1. Update GnuTLS to version 3.7.9 or 3.8.1+ using your distribution's package manager. 2. Restart all services using GnuTLS. 3. For Red Hat systems: 'yum update gnutls'. 4. For Debian/Ubuntu: 'apt update && apt upgrade gnutls'.
🔧 Temporary Workarounds
Disable RSA key exchange
linuxConfigure TLS servers to use non-RSA key exchange methods like ECDHE or DHE
For Apache: SSLProtocol -ALL +TLSv1.2 +TLSv1.3
For Nginx: ssl_protocols TLSv1.2 TLSv1.3; ssl_ciphers 'ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256';
🧯 If You Can't Patch
- Implement network segmentation to limit access to vulnerable systems
- Use TLS termination proxies with patched GnuTLS versions in front of vulnerable systems
🔍 How to Verify
Check if Vulnerable:
Check GnuTLS version with 'gnutls-cli --version' or 'dpkg -l | grep gnutls' or 'rpm -q gnutls'
Check Version:
gnutls-cli --version | head -1
Verify Fix Applied:
Verify version is 3.7.9 or 3.8.1+ using version check commands
📡 Detection & Monitoring
Log Indicators:
- Unusual volume of TLS handshake failures
- Multiple RSA ClientKeyExchange messages from single sources
Network Indicators:
- High volume of TLS connection attempts to same server
- Unusual timing patterns in TLS handshakes
SIEM Query:
source_ip COUNT BY dest_ip WHERE protocol=tls AND handshake_failure=true OVER 1h > 1000
🔗 References
- https://access.redhat.com/security/cve/CVE-2023-0361
- https://github.com/tlsfuzzer/tlsfuzzer/pull/679
- https://gitlab.com/gnutls/gnutls/-/issues/1050
- https://lists.debian.org/debian-lts-announce/2023/02/msg00015.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UFIA3X4IZ3CW7SRQ2UHNHNPMRIAWF2FI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS4KVDOG6QTALWHC2QE4Y7VPDRMLTRWQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z634YBXAJ5VLDI62IOPBVP5K6YFHAWCY/
- https://security.netapp.com/advisory/ntap-20230324-0005/
- https://security.netapp.com/advisory/ntap-20230725-0005/
- https://access.redhat.com/security/cve/CVE-2023-0361
- https://github.com/tlsfuzzer/tlsfuzzer/pull/679
- https://gitlab.com/gnutls/gnutls/-/issues/1050
- https://lists.debian.org/debian-lts-announce/2023/02/msg00015.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UFIA3X4IZ3CW7SRQ2UHNHNPMRIAWF2FI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS4KVDOG6QTALWHC2QE4Y7VPDRMLTRWQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z634YBXAJ5VLDI62IOPBVP5K6YFHAWCY/
- https://security.netapp.com/advisory/ntap-20230324-0005/
- https://security.netapp.com/advisory/ntap-20230725-0005/