CVE-2018-0737

Updated: 2026-02-27 00:21:05.533844

Description:

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x MEDIUM 4.3
CVSS Version 3.x MEDIUM 5.9

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU openssl 3.0.7 5.9 MEDIUM Not Vulnerable 2025-09-30 05:34:09 Not affected: CVE-2018-0737 impacts only OpenSSL 1.0.2b–1.0.2o and 1.1.0–1.1.0h (fixed in 1.0.2p...
Alpine Linux 3.18 ELS openssl 3.1.8 5.9 MEDIUM Ignored 2025-09-09 10:42:50 Ignored due to low severity
CentOS 6 ELS openssl 1.0.1e 5.9 MEDIUM Released CLSA-2021:1632262317 2022-05-05 12:01:45
CentOS 7 ELS openssl 1.0.2k 5.9 MEDIUM Ignored 2025-09-09 10:42:49 Ignored due to low severity
CentOS 8.4 ELS openssl 1.1.1g 5.9 MEDIUM Ignored 2025-09-09 10:42:52 Ignored due to low severity
CentOS 8.5 ELS openssl 1.1.1k 5.9 MEDIUM Ignored 2025-09-09 10:42:51 Ignored due to low severity
CentOS Stream 8 ELS openssl 1.1.1k 5.9 MEDIUM Ignored 2025-09-09 10:42:53 Ignored due to low severity
CloudLinux 6 ELS openssl 1.0.1e 5.9 MEDIUM Released 2021-11-02 14:03:17
CloudLinux 7 ELS openssl 1.0.2k 5.9 MEDIUM Ignored 2025-09-09 10:42:54 Ignored due to low severity
Oracle Linux 6 ELS openssl 1.0.1e 5.9 MEDIUM Not Vulnerable CLSA-2021:1634922881 2021-11-02 14:03:17 Not affected: CVE-2018-0737 only impacts OpenSSL 1.0.2b–1.0.2o and 1.1.0–1.1.0h (fixed in 1.0.2p...
Total: 16