### [CVE-2018-0497](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0497) ![](https://img.shields.io/static/v1?label=Product&message=ARM%20mbed%20TLS%20before%202.12.0%2C%20before%202.7.5%2C%20and%20before%202.1.14&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=plaintext%20recovery&color=brighgreen) ### Description ARM mbed TLS before 2.12.0, before 2.7.5, and before 2.1.14 allows remote attackers to achieve partial plaintext recovery (for a CBC based ciphersuite) via a timing-based side-channel attack. This vulnerability exists because of an incorrect fix (with a wrong SHA-384 calculation) for CVE-2013-0169. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/lnick2023/nicenice - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/xbl3/awesome-cve-poc_qazbnm456