Lucene search

K
osvGoogleOSV:CVE-2023-1732
HistoryMay 10, 2023 - 12:15 p.m.

CVE-2023-1732

2023-05-1012:15:10
Google
osv.dev
8
cve-2023-1732
randomness weakness
shared secret
kyber
frodokem
tkn20
blindrsa
crypto/rand.read()
user-provided randomness
weakness in blinding
plain text integrity

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.5%

When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read()Β returns an error. In rare deployment cases (error thrown by the Read()Β function), this could lead to a predictable shared secret.

The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.5%