{"id":"CVE-2024-26306","details":"iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in \"Everlasting ROBOT: the Marvin Attack\" by Hubert Kario.","modified":"2026-04-16T04:37:15.897005122Z","published":"2024-05-14T15:08:51.197Z","related":["ALSA-2024:4241","ALSA-2024:9185","SUSE-SU-2024:1981-1","openSUSE-SU-2024:13964-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00027.html"},{"type":"ADVISORY","url":"https://www.insyde.com/security-pledge/SA-2024005"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20250228-0007/"},{"type":"ADVISORY","url":"https://downloads.es.net/pub/iperf/esnet-secadv-2024-0001.txt.asc"},{"type":"ADVISORY","url":"https://github.com/esnet/iperf/releases/tag/3.17"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/esnet/iperf","events":[{"introduced":"0"},{"fixed":"64b324df266ae7d44d5a75956b8ff7cbcd1d21fe"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.17"}]}}],"versions":["2.0-RELEASE","2.0.1-RELEASE","2.0.2-RELEASE","2.0.3-RELEASE","2.0.4-RELEASE","3.0-ALPHA1","3.0-BETA1","3.0-BETA2","3.0-BETA3","3.0-BETA4","3.0-BETA5","3.0.1","3.0.4","3.1","3.10","3.10.1","3.11","3.12","3.13","3.14","3.15","3.16","3.16-beta1","3.1b1","3.1b2","3.1b3","3.2","3.2rc1","3.3","3.4","3.5","3.6","3.7","3.8","3.8.1","3.9","iperf-3.0a1","iperf3","trunk"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26306.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}