DNA View

CVE-2024-9143

Medium
Low Medium High Critical
4.3
CVSS Score
Published: Oct 16, 2024
Last Modified: Nov 03, 2025

Vulnerability Description

Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted
explicit values for the field polynomial can lead to out-of-bounds memory reads
or writes.

Impact summary: Out of bound memory writes can lead to an application crash or
even a possibility of a remote code execution, however, in all the protocols
involving Elliptic Curve Cryptography that we're aware of, either only "named
curves" are supported, or, if explicit curve parameters are supported, they
specify an X9.62 encoding of binary (GF(2^m)) curves that can't represent
problematic input values. Thus the likelihood of existence of a vulnerable
application is low.

In particular, the X9.62 encoding is used for ECC keys in X.509 certificates,
so problematic inputs cannot occur in the context of processing X.509
certificates. Any problematic use-cases would have to be using an "exotic"
curve encoding.

The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(),
and various supporting BN_GF2m_*() functions.

Applications working with "exotic" explicit binary (GF(2^m)) curve parameters,
that make it possible to represent invalid field polynomials with a zero
constant term, via the above or similar APIs, may terminate abruptly as a
result of reading or writing outside of array bounds. Remote code execution
cannot easily be ruled out.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Attack Vector
N
Attack Complexity
L
Privileges Required
L
User Interaction
N
Scope
U
Confidentiality
N
Integrity
L
Availability
N

Available Security Patches

7 patches available from vendors

View All Patches
Oracle

CPUOCT2025

Oracle Critical Patch Update Advisory - October 2025

Severity
Critical
Released
Oct 21, 2025
Restart Required
Security Update
Microsoft

2024-Oct-CVE-2024-9143

CVE-2024-9143: Low-level invalid GF(2^m) parameters lead to OOB memory access

Severity
Unknown
Released
Oct 01, 2025
Security Update
Microsoft

2025-Mar-CVE-2024-9143

CVE-2024-9143: None

Severity
Unknown
Released
Sep 04, 2025
Security Update
Microsoft

2024-Nov-CVE-2024-9143

CVE-2024-9143: None

Severity
Unknown
Released
Sep 04, 2025
Security Update
Oracle

CPUJUL2025

Oracle Critical Patch Update Advisory - July 2025

Severity
Critical
Released
Jul 15, 2025
Restart Required
Security Update
Oracle

CPUAPR2025

Oracle Critical Patch Update Advisory - April 2025

Severity
Critical
Released
Apr 15, 2025
Restart Required
Security Update
Oracle

CPUJAN2025

Oracle Critical Patch Update Advisory - January 2025

Severity
Critical
Released
Jan 21, 2025
Restart Required
Security Update

Severity Details

4.3
out of 10.0
Medium

Weakness Type (CWE)

CWE-125 Top 25 #11

Out-of-bounds Read

Description
The product reads data past the end, or before the beginning, of the intended buffer.
Typical Severity
High
Abstraction Level
Base

Key Information

Published Date
October 16, 2024