{
  "threat_severity" : "Moderate",
  "public_date" : "2024-01-22T00:00:00Z",
  "bugzilla" : {
    "description" : "jsrsasign: vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process",
    "id" : "2259531",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2259531"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-203",
  "details" : [ "Versions of the package jsrsasign before 11.0.0 are vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process. An attacker can decrypt ciphertexts by exploiting the Marvin security flaw. Exploiting this vulnerability requires the attacker to have access to a large number of ciphertexts encrypted with the same key.\nWorkaround \nThe vulnerability can be mitigated by finding and replacing RSA and RSAOAEP decryption with another crypto library.", "A flaw was found in jsrsasign, which is vulnerable to an observable discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process. This flaw allows an attacker to decrypt ciphertexts. Exploiting this vulnerability requires the attacker to have access to a large number of ciphertexts encrypted with the same key." ],
  "affected_release" : [ {
    "product_name" : "Migration Toolkit for Virtualization 2.5",
    "release_date" : "2024-02-20T00:00:00Z",
    "advisory" : "RHBA-2024:0928",
    "cpe" : "cpe:/a:redhat:migration_toolkit_virtualization:2.5::el9",
    "package" : "migration-toolkit-virtualization/mtv-console-plugin-rhel9:2.5.5-3"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Quay 3",
    "fix_state" : "Affected",
    "package_name" : "quay/quay-rhel8",
    "cpe" : "cpe:/a:redhat:quay:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-21484\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-21484\nhttps://github.com/kjur/jsrsasign/issues/598\nhttps://github.com/kjur/jsrsasign/releases/tag/11.0.0\nhttps://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6070734\nhttps://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-6070733\nhttps://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6070732\nhttps://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-6070731" ],
  "name" : "CVE-2024-21484",
  "csaw" : false
}