CVE-2023-30590

7 documents7 sources
Severity
7.5HIGH
EPSS
1.0%
top 23.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 28
Latest updateApr 16

Description

The generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet, but the function is also needed to compute the corresponding public key after calling setPrivateKey(). However, the documentation says this API call: "Generates private and public Diffie-Hellman key values". The documented behavior is very different from the actual behavior, and this difference could easily lead

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5nodejs/node4.04.*+16
NVDnodejs/node.js16.0.016.20.1+2
Debiannodejs< 12.22.12~dfsg-1~deb11u5+3

🔴Vulnerability Details

3
CVEList
CVE-2023-30590: The generateKeys() API function returned from crypto2023-11-28
GHSA
GHSA-v63h-9gvh-2x49: The generateKeys() API function returned from crypto2023-11-28
OSV
CVE-2023-30590: The generateKeys() API function returned from crypto2023-11-28

📋Vendor Advisories

3
Ubuntu
Node.js vulnerabilities2024-04-16
Red Hat
nodejs: DiffieHellman do not generate keys after setting a private key2023-06-20
Debian
CVE-2023-30590: nodejs - The generateKeys() API function returned from crypto.createDiffieHellman() only ...2023
CVE-2023-30590 (HIGH CVSS 7.5) | The generateKeys() API function ret | cvebase.io