CVE-2025-7071
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-29

Last updated on: 2025-08-29

Assigner: Switzerland Government Common Vulnerability Program

Description
Padding oracle attack vulnerability in Oberon microsystem AG’s ocrypto library in all versions since 3.1.0 and prior to 3.9.2 allows an attacker to recover plaintexts via timing measurements of AES-CBC PKCS#7 decrypt operations.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-29
Last Modified
2025-08-29
Generated
2026-05-07
AI Q&A
2025-08-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
oberon_microsystem_ag ocrypto 3.9.1
oberon_microsystem_ag ocrypto 3.1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-327 The product uses a broken or risky cryptographic algorithm or protocol.
CWE-208 Two separate operations in a product require different amounts of time to complete, in a way that is observable to an actor and reveals security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a timing side-channel issue in Oberon microsystem AG's ocrypto library versions 3.1.0 to 3.9.1. It occurs in the AES-CBC decryption process with PKCS#7 padding, where the padding removal is not done in constant time. An attacker can send many ciphertext probes and measure timing differences between padding error and no error responses to perform a padding oracle attack. This allows the attacker to determine the exact plaintext length and recover the plaintext byte-by-byte. [1]


How can this vulnerability impact me? :

The vulnerability allows an attacker to fully recover plaintext data encrypted with AES-CBC and PKCS#7 padding in the affected versions of the ocrypto library. This means sensitive information could be exposed if an attacker can send many ciphertext probes and measure response timings, potentially compromising confidentiality of encrypted communications or stored data. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by analyzing timing discrepancies in AES-CBC PKCS#7 decryption operations, specifically by sending numerous ciphertext probes and measuring the time taken for padding error versus no padding error responses. There are no specific commands provided in the resources, but detection involves timing side-channel analysis targeting the function `ocrypto_aes_cbc_pkcs_final_dec` in the affected library versions. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading the ocrypto library to version 3.9.2 or later, where partial mitigation has been implemented by making the padding removal code constant-time. Additionally, clients should implement application-specific, constant-time integrity validation of decrypted messages to fully mitigate the vulnerability. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart