libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.
History

Wed, 17 Dec 2025 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.02675}

epss

{'score': 0.02395}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-12-17T22:06:14.998Z

Reserved: 2017-04-05T00:00:00.000Z

Link: CVE-2017-7526

cve-icon Vulnrichment

Updated: 2024-08-05T16:04:11.873Z

cve-icon NVD

Status : Modified

Published: 2018-07-26T13:29:00.183

Modified: 2024-11-21T03:32:05.007

Link: CVE-2017-7526

cve-icon Redhat

Severity : Moderate

Publid Date: 2017-06-29T00:00:00Z

Links: CVE-2017-7526 - Bugzilla

cve-icon OpenCVE Enrichment

No data.