Use of a broken or risky cryptographic algorithm in Crypto++ - CVE-2021-40530
Published: December 21, 2023
Vulnerability identifier: #VU84654
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2021-40530
CWE-ID: CWE-327
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Crypto++
Crypto++
Software vendor:
cryptopp.com
cryptopp.com
Description
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to an error in ElGamal implementation, which may allow plaintext recovery because. A remote attacker can gain access to sensitive information.
Remediation
Install updates from vendor's website.
External links
- https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
- https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2
- https://eprint.iacr.org/2021/923
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HGVBZ2TTRKCTYAZTRHTF6OBD4W37F5MT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/57OJA2K5AHX5HAU2QBDRWLGIIUX7GASC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJYOZGWI7TD27SEXILSM6VUTPPEICDL7/