U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-9231 Detail

Description

Issue summary: A timing side-channel which could potentially allow remote recovery of the private key exists in the SM2 algorithm implementation on 64 bit ARM platforms. Impact summary: A timing side-channel in SM2 signature computations on 64 bit ARM platforms could allow recovering the private key by an attacker.. While remote key recovery over a network was not attempted by the reporter, timing measurements revealed a timing signal which may allow such an attack. OpenSSL does not directly support certificates with SM2 keys in TLS, and so this CVE is not relevant in most TLS contexts. However, given that it is possible to add support for such certificates via a custom provider, coupled with the fact that in such a custom provider context the private key may be recoverable via remote timing measurements, we consider this to be a Moderate severity issue. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as SM2 is not an approved algorithm.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://github.com/openssl/openssl/commit/567f64386e43683888212226824b6a179885a0fe OpenSSL Software Foundation
https://github.com/openssl/openssl/commit/cba616c26ac8e7b37de5e77762e505ba5ca51698 OpenSSL Software Foundation
https://github.com/openssl/openssl/commit/eed5adc9f969d77c94f213767acbb41ff923b6f4 OpenSSL Software Foundation
https://github.com/openssl/openssl/commit/fc47a2ec078912b3e914fab5734535e76c4820c2 OpenSSL Software Foundation
https://openssl-library.org/news/secadv/20250930.txt OpenSSL Software Foundation

Weakness Enumeration

CWE-ID CWE Name Source
CWE-385 Covert Timing Channel OpenSSL Software Foundation  

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-9231
NVD Published Date:
09/30/2025
NVD Last Modified:
09/30/2025
Source:
OpenSSL Software Foundation