First published: Wed Dec 13 2023(Updated: )
A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cryptography | <42.0.0 | 42.0.0 |
pip/cryptography | <42.0.0 | 42.0.0 |
debian/python-cryptography | <=3.3.2-1<=3.3.2-1+deb11u1<=38.0.4-3+deb12u1<=38.0.4-3~deb12u1 | 43.0.0-1 |
redhat ANSIBLE automation platform | =2.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Red Hat Update Infrastructure | =4 | |
cryptography.io cryptography python | <42.0.0 | |
Couchbase Server | =7.6.0 | |
Couchbase Server | =7.6.1 | |
IBM Storage Defender Resiliency Service | <=2.0.0 - 2.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50782 is considered a critical vulnerability due to the potential exposure of confidential data.
To fix CVE-2023-50782, upgrade the python-cryptography package to version 42.0.0 or higher.
CVE-2023-50782 affects versions of the python-cryptography package below 42.0.0.
Yes, CVE-2023-50782 could allow remote attackers to decrypt messages leading to potential data breaches.
The vulnerability in CVE-2023-50782 arises from inadequate protection of RSA key exchanges in TLS servers.