The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-5981

CVE-2023-5981: GNU GnuTLS Information Disclosure Flaw

CVE-2023-5981 is an information disclosure vulnerability in GNU GnuTLS caused by timing differences in RSA-PSK responses. This article covers the technical details, affected versions, security impact, and mitigation.

Published: February 4, 2026

CVE-2023-5981 Overview

CVE-2023-5981 is a timing side-channel vulnerability discovered in GnuTLS, the widely-used TLS library implementation. The vulnerability exists in the RSA-PSK (Pre-Shared Key) handshake processing where response times to malformed ciphertexts differ from response times of ciphertexts with correct PKCS#1 v1.5 padding. This timing discrepancy can be exploited by a network-based attacker to potentially recover sensitive cryptographic material through statistical analysis of response times.

Critical Impact

This timing attack vulnerability could allow remote attackers to decrypt TLS-protected communications by exploiting observable differences in RSA-PSK decryption processing times, potentially compromising the confidentiality of encrypted sessions.

Affected Products

  • GNU GnuTLS 1.5.0 and later versions
  • Red Hat Linux 8.0 and 9.0
  • Fedora 37 and 38

Discovery Timeline

  • 2023-11-28 - CVE-2023-5981 published to NVD
  • 2025-11-04 - Last updated in NVD database

Technical Details for CVE-2023-5981

Vulnerability Analysis

This vulnerability is classified as CWE-203 (Observable Discrepancy), commonly known as a timing side-channel attack. The flaw resides in GnuTLS's RSA-PSK ClientKeyExchange message processing, where the decryption routine exhibits different execution times depending on whether the submitted ciphertext contains valid or invalid PKCS#1 v1.5 padding.

In a properly implemented RSA decryption routine, the processing time should be constant regardless of the input validity to prevent timing-based information leakage. However, the vulnerable GnuTLS implementation takes a different code path or performs different operations when encountering malformed padding versus correctly formatted ciphertexts. An attacker capable of measuring these timing differences over the network can systematically probe the server with crafted ciphertexts and statistically analyze the response times.

This class of vulnerability is similar to historical padding oracle attacks like Bleichenbacher's attack on PKCS#1 v1.5. While modern implementations typically include countermeasures against such attacks, subtle timing leaks can still provide enough information for a determined attacker to recover the pre-master secret used in TLS session establishment.

Root Cause

The root cause of this vulnerability is the lack of constant-time implementation in the RSA-PSK decryption handling within GnuTLS. When processing the ClientKeyExchange message during the TLS handshake, the library's PKCS#1 v1.5 padding validation routine introduces observable timing variations based on the padding validity. This violates fundamental cryptographic implementation principles that require side-channel resistant code paths for security-sensitive operations.

Attack Vector

The attack vector is network-based and requires no authentication or user interaction. An attacker positioned on the network path between a client and a vulnerable GnuTLS-based server can:

  1. Intercept a legitimate TLS handshake and capture the encrypted pre-master secret
  2. Send multiple crafted ClientKeyExchange messages with modified ciphertexts to the target server
  3. Measure the response times with high precision to detect timing variations
  4. Apply statistical analysis to the timing data to determine padding validity
  5. Use adaptive chosen-ciphertext techniques to gradually recover the plaintext pre-master secret

This attack requires significant network measurements and computational resources, but is feasible against a persistent attacker with stable network access to the target.

Detection Methods for CVE-2023-5981

Indicators of Compromise

  • Unusual volume of TLS handshake failures or errors from specific source IPs
  • Repeated ClientKeyExchange messages from the same client within short time periods
  • Abnormal patterns in TLS session establishment timing metrics
  • High frequency of RSA-PSK cipher suite negotiation attempts

Detection Strategies

  • Monitor TLS handshake logs for patterns indicating systematic probing behavior
  • Implement anomaly detection for TLS session establishment timing distributions
  • Deploy network intrusion detection rules to identify Bleichenbacher-style attack patterns
  • Audit GnuTLS library versions across infrastructure to identify vulnerable deployments

Monitoring Recommendations

  • Enable detailed TLS handshake logging on servers using GnuTLS
  • Configure alerting for unusual spikes in TLS handshake failures
  • Implement network traffic analysis for detecting timing attack patterns
  • Regularly scan systems to verify GnuTLS has been updated to patched versions

How to Mitigate CVE-2023-5981

Immediate Actions Required

  • Update GnuTLS to the latest patched version immediately
  • Review and inventory all systems and applications using GnuTLS
  • Consider disabling RSA-PSK cipher suites if not operationally required
  • Prioritize patching internet-facing servers and services

Patch Information

Security patches have been released by multiple vendors. Refer to the following advisories for version-specific patch information:

  • GnuTLS Security Announcement GNUTLS-SA-2023-10-23 - Official GnuTLS security advisory
  • Red Hat Security Advisory RHSA-2024:0155 - Red Hat Enterprise Linux patches
  • Red Hat Security Advisory RHSA-2024:0319 - Additional Red Hat patches
  • Debian LTS Announcement - Debian security update
  • Fedora Package Announcements - Fedora security updates

For tracking and additional details, see Red Hat Bugzilla #2248445.

Workarounds

  • Disable RSA-PSK cipher suites in GnuTLS configuration if they are not required for your use case
  • Configure TLS to prefer non-RSA key exchange mechanisms such as ECDHE
  • Implement network-level rate limiting on TLS handshake attempts from individual sources
  • Consider deploying TLS-terminating proxies with patched implementations in front of vulnerable servers
bash
# Example: Configure GnuTLS priority string to exclude RSA-PSK cipher suites
# In your application or server configuration, set the priority string:
GNUTLS_PRIORITY="NORMAL:-RSA-PSK"

# For systems using /etc/crypto-policies (RHEL/Fedora):
# Update system-wide crypto policy to use stronger defaults
update-crypto-policies --set DEFAULT

# Verify GnuTLS version after patching
gnutls-cli --version

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechGnu Gnutls

  • SeverityMEDIUM

  • CVSS Score5.9

  • EPSS Probability0.57%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-203
  • Technical References
  • Red Hat Security Advisory RHSA-2024:0155

  • Red Hat Security Advisory RHSA-2024:0319

  • Red Hat Security Advisory RHSA-2024:0399

  • Red Hat Security Advisory RHSA-2024:0451

  • Red Hat Security Advisory RHSA-2024:0533

  • Red Hat Security Advisory RHSA-2024:1383

  • Red Hat Security Advisory RHSA-2024:2094

  • Red Hat Bug Report #2248445

  • Openwall OSS Security Discussion

  • Debian LTS Announcement November 2023

  • Fedora Package Announcement

  • Fedora Package Announcement
  • Vendor Resources
  • Red Hat CVE Details for CVE-2023-5981

  • GnuTLS Security Announcement GNUTLS-SA-2023-10-23
  • Related CVEs
  • CVE-2025-32989: GNU GnuTLS Information Disclosure Flaw

  • CVE-2023-0361: GnuTLS Information Disclosure Vulnerability

  • CVE-2024-0553: GnuTLS Information Disclosure Flaw

  • CVE-2025-32990: GNU GnuTLS Heap Buffer Overflow DoS Flaw
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English