First published: Fri Jan 19 2024(Updated: )
Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed.
Credit: disclosure@vulncheck.com
Affected Software | Affected Version | How to fix |
---|---|---|
Consensys Discovery | <0.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23688 has a moderate severity due to the reuse of the AES/GCM nonce leading to potential session key exposure.
To fix CVE-2024-23688, upgrade Consensys Discovery to version 0.4.5 or later.
CVE-2024-23688 is caused by the use of the same AES/GCM nonce for the entire session in versions of Consensys Discovery before 0.4.5.
CVE-2024-23688 is classified as a cryptographic vulnerability related to nonce reuse in encryption.
Any user of Consensys Discovery versions prior to 0.4.5 is affected by CVE-2024-23688.