CVE-2019-1543 — Use of a Broken or Risky Cryptographic Algorithm in Openssl
Severity
7.4HIGHNVD
EPSS
3.8%
top 11.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 6
Latest updateMay 13
Description
ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that …
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 2.2 | Impact: 5.2
Affected Packages4 packages
▶CVEListV5openssl/opensslFixed in OpenSSL 1.1.0k (Affected 1.1.0-1.1.0j), Fixed in OpenSSL 1.1.1c (Affected 1.1.1-1.1.1b)+1
🔴Vulnerability Details
2📋Vendor Advisories
3📐Framework References
1💬Community
6Bugzilla
▶
Bugzilla
▶