CVE-2021-40528 — Use of a Broken or Risky Cryptographic Algorithm in Libgcrypt
Severity
5.9MEDIUMNVD
EPSS
0.1%
top 73.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 6
Latest updateJul 15
Description
The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6
Affected Packages1 packages
🔴Vulnerability Details
3📋Vendor Advisories
8Oracle
▶
Oracle▶
Oracle Oracle Communications Risk Matrix: Configuration (GnuPG Libgcrypt) — CVE-2021-40528↗2022-10-15