CVE-2021-40530Use of a Broken or Risky Cryptographic Algorithm in Crypto

Severity
5.9MEDIUMNVD
EPSS
0.3%
top 51.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 6
Latest updateMay 24

Description

The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6

Affected Packages2 packages

debiandebian/libcrypto< libcrypto++ 8.6.0-1 (bookworm)

Also affects: Fedora 33, 34, 35

🔴Vulnerability Details

2
GHSA
GHSA-p3r9-6fhw-hgv8: The ElGamal implementation in Crypto++ through 82022-05-24
OSV
CVE-2021-40530: The ElGamal implementation in Crypto++ through 82021-09-06

📋Vendor Advisories

1
Debian
CVE-2021-40530: libcrypto++ - The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery bec...2021
CVE-2021-40530 — Cryptopp Crypto vulnerability | cvebase