SSLVPN Client Timing Attack Risks

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2023-011 CVE-2022-4304 01/25/2023 medium v1

Vulnerability details

A timing-based attack exists in the OpenSSL RSA decryption.

Impacted products

SSL VPN Client medium SSL VPN Cient is impacted


Version Date Description
v1 01/25/2023 Initial release


SSL VPN Client

CVSS v3.1 Overall Score: 6.2      


Impacted version

A timing-based attack may be possible under certain circumstance for an attacker to achieve a successful decryption.

  • SSLVPN Client prior to 3.2.1

Workaround solution


There is no workaround solution.

The 3.2.1 update fix this vulnerability.

Attack Vector Attack Complexity Privileges Required User Interaction Scope Confidentiality Impact Integrity Impact Availability impact
Network High None Required Unchanged High None None
CVSS Base score: 5.3 CVSS Vector: (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N)
Exploit Code Maturity Remediation Level Report Confidence
Unproven that exploit exists Official fix Confirmed
CVSS Temporal score: 4.6 CVSS Vector: (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Confidentiality Requirement Integrity Requirement Availability Requirement
High High High
CVSS Environmental score: 6.2 CVSS Vector: (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X)