CVE-2024-23688
Consensys Discovery Nonce Reuse
Severity Score
5.3
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed.
Las versiones de Consensys Discovery inferiores a 0.4.5 utilizan el mismo nonce AES/GCM durante toda la sesión que idealmente debería ser único para cada mensaje. La clave privada del nodo no está comprometida, solo se expone la clave de sesión generada para una comunicación entre pares específica.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-01-19 CVE Reserved
- 2024-01-19 CVE Published
- 2024-01-27 EPSS Updated
- 2024-08-01 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-323: Reusing a Nonce, Key Pair in Encryption
- CWE-330: Use of Insufficiently Random Values
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://github.com/advisories/GHSA-w3hj-wr2q-x83g | Third Party Advisory | |
https://vulncheck.com/advisories/vc-advisory-GHSA-w3hj-wr2q-x83g | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83g | 2024-01-26 |