Security vulnerabilities

This page lists publicly disclosed security vulnerabilities that affect DigiCert® TrustCore SDK. Each entry includes the CVE identifier (if one exists), the affected component or module, the CVSS v3.1 base score and severity, the first TrustCore SDK release that contains the fix, and recommended mitigation steps.

Vulnerabilities

CVE / AdvisoryAffected component(s)Severity (CVSS v3.1)Fixed inMitigation / work-around
CVE-2023-48795 – “Terrapin” SSH prefix-truncationNanoSSH 7.05.9 MediumU4Upgrade to U4 or later AND keep the default build options that disable chacha20-poly1305 and CBC with Encrypt-then-MAC.
CVE-2023-46445 – Rogue Extension NegotiationNanoSSH 7.05.9 MediumU4Upgrade to U4 or later.
CVE-2023-46446 – Rogue Session AttackNanoSSH 7.06.8 MediumU4Upgrade to U4 or later.
CVE-2023-3817 – OpenSSL DH parameter validationOpenSSL Connector 1.15.3 MediumU6Upgrade to U6 or later.
CVE-2022-4304 – RSA decryption timing side-channelNanoCrypto 7.05.9 MediumU4 (build with --enable-vlong-const)Re-build with the enable-vlong-const flag or upgrade to U4+.
CVE-2016-2183 – SWEET32 (3DES)OpenSSL Connector 7.0 / NanoSSL 7.07.5 HighU4 (3DES disabled by default)Upgrade to U4+ or disable 3DES cipher suites manually.

Other advisories

Ticket #DetailsComponent(s)SeverityFixed inNotes
#3658904RSA signature computation glitchNanoSSH / NanoSSL / NanoSecHighU4Update to U4+ to ensure constant-time RSA operations.
#3834648
#3706260
SIGALRM blocked when linking libcrypto.OpenSSL ConnectorMediumU4Build with --disable-tcp-init flag or upgrade to U4+.
#04187099Memory leak in TLS serverNanoSSL 7.0LowU6Upgrade to U6+.

Mitigation best practices

  • Always build the latest TrustCore SDK release.
  • Follow NIST SP 800-131A Rev. 2 recommendations (disable legacy ciphers such as 3DES and RSA keys <2048 bits) and be aware of upcoming guidance like NIST SP 800-131A Rev. 3.
  • Enable compiler flags that enforce constant-time crypto (enable-vlong-const, --fips-700-compat).