CVE Vulnerabilities

CVE-2016-7798

Inadequate Encryption Strength

Published: Jan 30, 2017 | Modified: Apr 20, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V3
3.7 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.

Weakness

The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.

Affected Software

NameVendorStart VersionEnd Version
OpensslRuby-lang*2.0.0 (excluding)
Ruby-attr-encryptedUbuntuartful*
Ruby-attr-encryptedUbuntuesm-apps/xenial*
Ruby-attr-encryptedUbuntuxenial*
Ruby-attr-encryptedUbuntuyakkety*
Ruby-attr-encryptedUbuntuzesty*
Ruby-encryptorUbuntuartful*
Ruby-encryptorUbuntuesm-apps/xenial*
Ruby-encryptorUbuntuxenial*
Ruby-encryptorUbuntuyakkety*
Ruby-encryptorUbuntuzesty*
Ruby1.8Ubuntuprecise*
Ruby1.9.1Ubuntuprecise*
Ruby1.9.1Ubuntutrusty*
Ruby2.0Ubuntutrusty*
Ruby2.3Ubuntuartful*
Ruby2.3Ubuntuesm-infra/xenial*
Ruby2.3Ubuntuxenial*
Ruby2.3Ubuntuyakkety*
Ruby2.3Ubuntuzesty*

Potential Mitigations

References