CVE-2025-27498Improper Verification of Cryptographic Signature in Rust-aes-gcm

Severity
5.6MEDIUMNVD
EPSS
0.0%
top 89.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 3

Description

aes-gcm is a pure Rust implementation of the AES-GCM. In decrypt_in_place_detached, the decrypted ciphertext (which is the correct ciphertext) is exposed even if the tag is incorrect. This is because in decrypt_inplace in asconcore.rs, tag verification causes an error to be returned with the plaintext contents still in buffer. The vulnerability is fixed in 0.4.3.

CVSS vector

CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5rustcrypto/aeads< 0.4.3

🔴Vulnerability Details

3
OSV
CVE-2025-27498: aes-gcm is a pure Rust implementation of the AES-GCM2025-03-03
GHSA
AEADs/ascon-aead: Plaintext exposed in decrypt_in_place_detached even on tag verification failure2025-03-03
OSV
AEADs/ascon-aead: Plaintext exposed in decrypt_in_place_detached even on tag verification failure2025-03-03

📋Vendor Advisories

1
Debian
CVE-2025-27498: rust-aes-gcm - aes-gcm is a pure Rust implementation of the AES-GCM. In decrypt_in_place_detach...2025
CVE-2025-27498 — Debian Rust-aes-gcm vulnerability | cvebase