icon

We found results for “

CVE-2024-21530

Good to know:

icon

Date: October 2, 2024

Versions of the package cocoon before 0.4.0 are vulnerable to Reusing a Nonce, Key Pair in Encryption when the encrypt, wrap, and dump functions are sequentially called. An attacker can generate the same ciphertext by creating a new encrypted message with the same cocoon object.\r\r**Note:**\rThe issue does NOT affect objects created with Cocoon::new which utilizes ThreadRng.

Language: RUST

Severity Score

Severity Score

Weakness Type (CWE)

Reusing a Nonce, Key Pair in Encryption

CWE-323

Top Fix

icon

Upgrade Version

Upgrade to version cocoon - 0.4.0

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): HIGH
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): CHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us