关键信息 漏洞标题: Side channel in RSA key generation and operations (SSBleed, M-Step) (CVE-2025-54764) CVE编号: CVE-2025-54764 日期: 15 October 2025 影响版本: All versions of Mbed TLS up to 3.6.4 不受影响版本: Mbed TLS 3.6.5 and later, TF-PSA-Crypto 1.0 and later 影响: Disclosure of private key material 严重性: MEDIUM 漏洞描述: - Mbed TLS's modular inversion routine and GCD routine are vulnerable to local timing attacks. - Vulnerable functions include RSA key generation with and all functions. - Import of RSA private keys with . - Signature generation with PK ( , ). - Decryption with PK ( ). 攻击设置: - SSBleed: Uses the Memory Dependence Predictor on some Arm v9 CPUs. - M-Step: In a setting where TrustZone-M is used, M-Step framework allows the non-secure world to abuse timer interrupts. 受影响版本: All versions of Mbed TLS up to 3.6.4 are affected. 解决方法: Affected users should upgrade to Mbed TLS 3.6.5 or TF-PSA-Crypto 1.0.