First published: Thu Jul 08 2021(Updated: )
Eclipse TinyDTLS through 0.9-rc1 relies on the rand function in the C library, which makes it easier for remote attackers to compute the master key and then decrypt DTLS traffic.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse TinyDTLS | <=0.8.2 | |
Eclipse TinyDTLS | =0.9-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34430 is classified as a high severity vulnerability that could allow attackers to decrypt DTLS traffic.
To fix CVE-2021-34430, upgrade Eclipse TinyDTLS to version 0.9-rc2 or later.
The implications of CVE-2021-34430 include potential exposure of sensitive data due to insecure random number generation.
Eclipse TinyDTLS versions up to and including 0.8.2 and 0.9-rc1 are affected by CVE-2021-34430.
Yes, CVE-2021-34430 can be exploited remotely, allowing attackers to compute the master key from compromised DTLS traffic.