CVE Vulnerabilities

CVE-2016-7798

Inadequate Encryption Strength

Published: Jan 30, 2017 | Modified: Nov 05, 2020
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V3
3.7 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Ubuntu
LOW

The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.

Weakness

The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.

Affected Software

Name Vendor Start Version End Version
Openssl Ruby-lang * 2.0.0 (excluding)
Ruby-attr-encrypted Ubuntu artful *
Ruby-attr-encrypted Ubuntu esm-apps/xenial *
Ruby-attr-encrypted Ubuntu xenial *
Ruby-attr-encrypted Ubuntu yakkety *
Ruby-attr-encrypted Ubuntu zesty *
Ruby-encryptor Ubuntu artful *
Ruby-encryptor Ubuntu esm-apps/xenial *
Ruby-encryptor Ubuntu xenial *
Ruby-encryptor Ubuntu yakkety *
Ruby-encryptor Ubuntu zesty *
Ruby1.8 Ubuntu precise *
Ruby1.9.1 Ubuntu precise *
Ruby1.9.1 Ubuntu trusty *
Ruby2.0 Ubuntu trusty *
Ruby2.3 Ubuntu artful *
Ruby2.3 Ubuntu xenial *
Ruby2.3 Ubuntu yakkety *
Ruby2.3 Ubuntu zesty *

Potential Mitigations

References