CVE-2016-7798Inadequate Encryption Strength in Openssl

Severity
7.5HIGHNVD
EPSS
0.8%
top 26.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 30
Latest updateOct 24

Description

The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDruby-lang/openssl< 2.0.0
RubyGemsopenssl/openssl< 2.0.0

Also affects: Debian Linux 8.0, 9.0

Patches

🔴Vulnerability Details

4
OSV
OpenSSL gem for Ruby using inadequate encryption strength2017-10-24
GHSA
OpenSSL gem for Ruby using inadequate encryption strength2017-10-24
CVEList
CVE-2016-7798: The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for2017-01-30
OSV
CVE-2016-7798: The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for2017-01-30

📋Vendor Advisories

4
Ubuntu
Ruby vulnerabilities2017-07-25
Microsoft
The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key which makes it easier for context-dependent attackers to bypass the encrypti2017-01-10
Red Hat
ruby: IV Reuse in GCM Mode2016-09-19
Debian
CVE-2016-7798: ruby-attr-encrypted - The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (a...2016

💬Community

2
Bugzilla
CVE-2016-7798 ruby: IV Reuse in GCM Mode2016-10-04
Bugzilla
CVE-2016-7798 ruby: IV Reuse in GCM Mode [fedora-all]2016-10-04
CVE-2016-7798 — Inadequate Encryption Strength | cvebase