CVE-2023-42811Improper Verification of Cryptographic Signature in Rust-aes-gcm

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 22
Latest updateNov 22

Description

aes-gcm is a pure Rust implementation of the AES-GCM. Starting in version 0.10.0 and prior to version 0.10.3, in the AES GCM implementation of decrypt_in_place_detached, the decrypted ciphertext (i.e. the correct plaintext) is exposed even if tag verification fails. If a program using the `aes-gcm` crate's `decrypt_in_place*` APIs accesses the buffer after decryption failure, it will contain a decryption of an unauthenticated input. Depending on the specific nature of the program this may enable

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

CVEListV5rustcrypto/aeads>= 0.10.0, < 0.10.3
NVDaes-gcm_project/aes-gcm0.10.00.10.3
crates.ioaes-gcm_project/aes-gcm0.10.00.10.3

Also affects: Fedora 37, 38, 39

🔴Vulnerability Details

3
OSV
Plaintext exposed in decrypt_in_place_detached even on tag verification failure2023-11-22
OSV
AEADs/aes-gcm: Plaintext exposed in decrypt_in_place_detached even on tag verification failure2023-09-22
GHSA
AEADs/aes-gcm: Plaintext exposed in decrypt_in_place_detached even on tag verification failure2023-09-22

📋Vendor Advisories

1
Debian
CVE-2023-42811: rust-aes-gcm - aes-gcm is a pure Rust implementation of the AES-GCM. Starting in version 0.10.0...2023
CVE-2023-42811 — Debian Rust-aes-gcm vulnerability | cvebase