First published: Thu Aug 22 2019(Updated: )
A cryptographic issue in OpenPGP.js <=4.2.0 allows an attacker who is able provide forged messages and gain feedback about whether decryption of these messages succeeded to conduct an invalid curve attack in order to gain the victim's ECDH private key.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openpetra | <=4.2.0 |
https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9155 is classified as a high-severity vulnerability due to its potential to compromise the ECDH private key of victims.
To mitigate CVE-2019-9155, you should upgrade to OpenPGP.js version 4.2.1 or later.
CVE-2019-9155 enables an invalid curve attack, allowing attackers to potentially recover the ECDH private key.
CVE-2019-9155 affects all users of OpenPGP.js versions 4.2.0 and earlier.
The impact of CVE-2019-9155 is significant as it may lead to unauthorized access to encrypted communications by extracting private keys.