Lucene search

K
githubGitHub Advisory DatabaseGHSA-2Q89-485C-9J2X
HistoryMay 11, 2023 - 8:40 p.m.

Improper random reading in CIRCL

2023-05-1120:40:54
CWE-20
CWE-755
GitHub Advisory Database
github.com
8
circl
randomness
shared secret
kyber
frodokem
crypto
patches
integrity
plaintext
vulnerability
deployment
error
fix
software

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

0.001 Low

EPSS

Percentile

19.5%

Impact

When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret.

The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.

Patches

The fix was introduced in CIRCL v. 1.3.3

Affected configurations

Vulners
Node
cloudflarecirclRange<1.3.3go
CPENameOperatorVersion
github.com/cloudflare/circllt1.3.3

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

0.001 Low

EPSS

Percentile

19.5%