CVE-2023-42811 — Improper Verification of Cryptographic Signature in Rust-aes-gcm
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 22
Latest updateNov 22
Description
aes-gcm is a pure Rust implementation of the AES-GCM. Starting in version 0.10.0 and prior to version 0.10.3, in the AES GCM implementation of decrypt_in_place_detached, the decrypted ciphertext (i.e. the correct plaintext) is exposed even if tag verification fails. If a program using the `aes-gcm` crate's `decrypt_in_place*` APIs accesses the buffer after decryption failure, it will contain a decryption of an unauthenticated input. Depending on the specific nature of the program this may enable…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6
Affected Packages4 packages
Also affects: Fedora 37, 38, 39
🔴Vulnerability Details
3📋Vendor Advisories
1Debian▶
CVE-2023-42811: rust-aes-gcm - aes-gcm is a pure Rust implementation of the AES-GCM. Starting in version 0.10.0...↗2023