cve/2021/CVE-2021-40530.md
2024-06-18 02:51:15 +02:00

18 lines
882 B
Markdown

### [CVE-2021-40530](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40530)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
### POC
#### Reference
- https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
#### Github
No PoCs found on GitHub currently.