mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
76 lines
2.5 KiB
JSON
76 lines
2.5 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-23688",
|
|
"ASSIGNER": "disclosure@vulncheck.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed.\n\n"
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-323 Reusing a Nonce, Key Pair in Encryption",
|
|
"cweId": "CWE-323"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83g",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83g"
|
|
},
|
|
{
|
|
"url": "https://github.com/advisories/GHSA-w3hj-wr2q-x83g",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/advisories/GHSA-w3hj-wr2q-x83g"
|
|
},
|
|
{
|
|
"url": "https://vulncheck.com/advisories/vc-advisory-GHSA-w3hj-wr2q-x83g",
|
|
"refsource": "MISC",
|
|
"name": "https://vulncheck.com/advisories/vc-advisory-GHSA-w3hj-wr2q-x83g"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"discovery": "INTERNAL"
|
|
}
|
|
} |