CVE-2025-9231
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/09/2025
Last modified:
04/11/2025
Description
Issue summary: A timing side-channel which could potentially allow remote<br />
recovery of the private key exists in the SM2 algorithm implementation on 64 bit<br />
ARM platforms.<br />
<br />
Impact summary: A timing side-channel in SM2 signature computations on 64 bit<br />
ARM platforms could allow recovering the private key by an attacker..<br />
<br />
While remote key recovery over a network was not attempted by the reporter,<br />
timing measurements revealed a timing signal which may allow such an attack.<br />
<br />
OpenSSL does not directly support certificates with SM2 keys in TLS, and so<br />
this CVE is not relevant in most TLS contexts. However, given that it is<br />
possible to add support for such certificates via a custom provider, coupled<br />
with the fact that in such a custom provider context the private key may be<br />
recoverable via remote timing measurements, we consider this to be a Moderate<br />
severity issue.<br />
<br />
The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this<br />
issue, as SM2 is not an approved algorithm.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
References to Advisories, Solutions, and Tools
- https://github.com/openssl/openssl/commit/567f64386e43683888212226824b6a179885a0fe
- https://github.com/openssl/openssl/commit/cba616c26ac8e7b37de5e77762e505ba5ca51698
- https://github.com/openssl/openssl/commit/eed5adc9f969d77c94f213767acbb41ff923b6f4
- https://github.com/openssl/openssl/commit/fc47a2ec078912b3e914fab5734535e76c4820c2
- https://openssl-library.org/news/secadv/20250930.txt
- http://www.openwall.com/lists/oss-security/2025/09/30/5



