Описание
Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed.
Ссылки
- Vendor Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.4.5 (исключая)
cpe:2.3:a:consensys:discovery:*:*:*:*:*:*:*:*
EPSS
Процентиль: 61%
0.00416
Низкий
5.3 Medium
CVSS3
Дефекты
CWE-323
CWE-330
Связанные уязвимости
github
почти 5 лет назад
Discovery uses the same AES/GCM Nonce throughout the session
EPSS
Процентиль: 61%
0.00416
Низкий
5.3 Medium
CVSS3
Дефекты
CWE-323
CWE-330