CVE Vulnerabilities

CVE-2020-1759

Reusing a Nonce, Key Pair in Encryption

Published: Apr 13, 2020 | Modified: Nov 21, 2024
CVSS 3.x
6.8
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
CVSS 2.x
5.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
6.4 MODERATE
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A vulnerability was found in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 where, A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by leveraging the reuse of a nonce in a session. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks.

Weakness

Nonces should be used for the present occasion and only once.

Affected Software

NameVendorStart VersionEnd Version
Ceph_storageRedhat4.0 (including)4.0 (including)
OpenshiftRedhat4.2 (including)4.2 (including)
OpenstackRedhat15 (including)15 (including)
Red Hat Ceph Storage 4.1RedHatceph-2:14.2.8-111.el8cp*
Red Hat Ceph Storage 4.1RedHatceph-ansible-0:4.0.31-1.el7cp*
CephUbuntueoan*
CephUbuntutrusty*
CephUbuntuupstream*

Potential Mitigations

References