CVE-2025-9231
September 30, 2025
Issue summary: A timing side-channel which could potentially allow remote
recovery of the private key exists in the SM2 algorithm implementation on 64 bit
ARM platforms.
Impact summary: A timing side-channel in SM2 signature computations on 64 bit
ARM platforms could allow recovering the private key by an attacker..
While remote key recovery over a network was not attempted by the reporter,
timing measurements revealed a timing signal which may allow such an attack.
OpenSSL does not directly support certificates with SM2 keys in TLS, and so
this CVE is not relevant in most TLS contexts. However, given that it is
possible to add support for such certificates via a custom provider, coupled
with the fact that in such a custom provider context the private key may be
recoverable via remote timing measurements, we consider this to be a Moderate
severity issue.
The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as SM2 is not an approved algorithm.
Affected Packages
openssl (CONAN):
Affected version(s) >=3.4.0 <3.4.3Fix Suggestion:
Update to version 3.4.3openssl (CONAN):
Affected version(s) >=3.2.0 <3.2.6Fix Suggestion:
Update to version 3.2.6openssl (CONAN):
Affected version(s) >=3.5.0 <3.5.4Fix Suggestion:
Update to version 3.5.4openssl (CONAN):
Affected version(s) >=3.3.1 <3.3.5Fix Suggestion:
Update to version 3.3.5https://github.com/openssl/openssl.git (GITHUB):
Affected version(s) >=openssl-3.2.0 <openssl-3.2.6Fix Suggestion:
Update to version openssl-3.2.6https://github.com/openssl/openssl.git (GITHUB):
Affected version(s) >=openssl-3.3.0 <openssl-3.3.5Fix Suggestion:
Update to version openssl-3.3.5https://github.com/openssl/openssl.git (GITHUB):
Affected version(s) >=openssl-3.4.0 <openssl-3.4.3Fix Suggestion:
Update to version openssl-3.4.3https://github.com/openssl/openssl.git (GITHUB):
Affected version(s) >=openssl-3.5.0 <openssl-3.5.4Fix Suggestion:
Update to version openssl-3.5.4Related Resources (6)
Do you need more information?
Contact UsCVSS v4
Base Score:
6.9
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
NONE
Vulnerable System Availability
LOW
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
6.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
LOW
Weakness Type (CWE)
Covert Timing Channel
EPSS
Base Score:
0.02