Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-46129
HistoryOct 31, 2023 - 12:00 a.m.

CVE-2023-46129

2023-10-3100:00:00
ubuntu.com
ubuntu.com
13
nats.io
nkeys library
encryption bug
nats-server
security
go library
cryptography
patch
authentication
communication
cloud
iot
edge computing
bug tracking
debian
unix

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.6

Confidence

Low

EPSS

0.001

Percentile

20.7%

NATS.io is a high performance open source pub-sub distributed communication
technology, built for the cloud, on-premise, IoT, and edge computing. The
cryptographic key handling library, nkeys, recently gained support for
encryption, not just for signing/authentication. This is used in
nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys
versions 0.4.0 through 0.4.5, corresponding with NATS server versions
2.10.0 through 2.10.3, the nkeys library’s xkeys encryption handling
logic mistakenly passed an array by value into an internal function, where
the function mutated that buffer to populate the encryption key to use. As
a result, all encryption was actually to an all-zeros key. This affects
encryption only, not signing. FIXME: FILL IN IMPACT ON NATS-SERVER AUTH
CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server
2.10.4, has a patch for this issue. No known workarounds are available. For
any application handling auth callouts in Go, if using the nkeys library,
update the dependency, recompile and deploy that in lockstep.

Bugs

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.6

Confidence

Low

EPSS

0.001

Percentile

20.7%