← Back to CVEs
CVE-2023-40661
MEDIUM5.4
Description
Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.
CVE Details
CVSS v3.1 Score5.4
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
Attack VectorPHYSICAL
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published11/6/2023
Last Modified11/3/2025
Sourcenvd
Honeypot Sightings0
Affected Products
opensc_project:openscredhat:enterprise_linux
Weaknesses (CWE)
CWE-119CWE-119
References
https://access.redhat.com/errata/RHSA-2023:7876(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2023:7879(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2023-40661(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2240913(secalert@redhat.com)
https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651(secalert@redhat.com)
https://github.com/OpenSC/OpenSC/releases/tag/0.24.0-rc1(secalert@redhat.com)
https://github.com/OpenSC/OpenSC/wiki/OpenSC-security-advisories(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2023/12/13/3(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2023:7876(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2023:7879(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/security/cve/CVE-2023-40661(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=2240913(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/OpenSC/OpenSC/releases/tag/0.24.0-rc1(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/OpenSC/OpenSC/wiki/OpenSC-security-advisories(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2023/11/msg00024.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2024/12/msg00026.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CPQOMCDWFRBMEFR5VK4N5MMXXU42ODE/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLYEFIBBA37TK3UNMZN5NOJ7IWCIXLQP/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.