Versions of the package cocoon before 0.4.0 are vulnerable to Reusing a Nonce, Key Pair in Encryption when the encrypt, wrap, and dump functions are sequentially called. An attacker can generate the same ciphertext by creating a new encrypted message with the same cocoon object.
**Note:**
The issue does NOT affect objects created with Cocoon::new which utilizes ThreadRng.
References
Configurations
No configuration.
History
04 Oct 2024, 13:50
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 Oct 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-02 05:15
Updated : 2024-10-04 13:50
NVD link : CVE-2024-21530
Mitre link : CVE-2024-21530
CVE.ORG link : CVE-2024-21530
JSON object : View
Products Affected
No product.
CWE
CWE-323
Reusing a Nonce, Key Pair in Encryption