First published: Mon Sep 06 2021(Updated: )
The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Libgcrypt | <1.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-40528.
The severity of CVE-2021-40528 is medium with a CVSS score of 5.9.
The software affected by CVE-2021-40528 is GnuPG Libgcrypt version up to 1.9.4.
The plaintext recovery vulnerability can be exploited during interaction between two cryptographic libraries by using a certain dangerous combination of the prime, generator, and ephemeral public key.
Yes, the fix for CVE-2021-40528 is available in Libgcrypt version 1.9.4.