CVE-2021-40528Use of a Broken or Risky Cryptographic Algorithm in Libgcrypt

Severity
5.9MEDIUMNVD
EPSS
0.1%
top 73.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 6
Latest updateJul 15

Description

The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6

Affected Packages1 packages

NVDgnupg/libgcrypt< 1.9.4

🔴Vulnerability Details

3
GHSA
GHSA-8m2v-68m9-q2c7: The ElGamal implementation in Libgcrypt before 12022-05-24
CVEList
CVE-2021-40528: The ElGamal implementation in Libgcrypt before 12021-09-06
OSV
CVE-2021-40528: The ElGamal implementation in Libgcrypt before 12021-09-06

📋Vendor Advisories

8
Oracle
Oracle Oracle Communications Risk Matrix: Signaling (libgcrypt) — CVE-2021-405282023-07-15
Oracle
Oracle Oracle Communications Risk Matrix: Install/Upgrade (Libgcrypt) — CVE-2021-405282023-01-15
Oracle
Oracle Oracle Communications Risk Matrix: Configuration (GnuPG Libgcrypt) — CVE-2021-405282022-10-15
Ubuntu
Libgcrypt vulnerabilities2021-09-16
Ubuntu
Libgcrypt vulnerabilities2021-09-16
CVE-2021-40528 — Gnupg Libgcrypt vulnerability | cvebase