CVE Vulnerabilities

CVE-2022-26307

Inadequate Encryption Strength

Published: Jul 25, 2022 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
8.8 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulerable to a brute force attack if an attacker has access to the users stored config. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.3.

Weakness

The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.

Affected Software

NameVendorStart VersionEnd Version
LibreofficeLibreoffice7.2.0 (including)7.2.7 (excluding)
LibreofficeLibreoffice7.3.0 (including)7.3.3 (excluding)
Red Hat Enterprise Linux 8RedHatlibreoffice-1:6.4.7.2-12.el8_7*
Red Hat Enterprise Linux 9RedHatlibreoffice-1:7.1.8.1-8.el9_1*
LibreofficeUbuntubionic*
LibreofficeUbuntuesm-infra/focal*
LibreofficeUbuntufocal*
LibreofficeUbuntutrusty*
LibreofficeUbuntuupstream*
LibreofficeUbuntuxenial*

Potential Mitigations

References