Miggo Logo

CVE-2023-42811: AEADs/aes-gcm: Plaintext exposed in decrypt_in_place_detached even on tag verification failure

4.7

CVSS Score
3.1

Basic Information

EPSS Score
0.02075%
Published
9/22/2023
Updated
2/16/2024
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
aes-gcmrust>= 0.10.0, <= 0.10.20.10.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the decryption step (via CTR keystream application) occurring before tag verification in the decrypt_in_place_detached function. This is evident from the NIST guideline citation and the comparison to the fixed AES GCM-SIV implementation where the buffer is re-encrypted on failure. The vulnerable versions of aes-gcm exposed plaintext in the buffer even when authentication failed, enabling potential CCAs. The patched version (0.10.3) would have moved the decryption step after successful tag verification.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry In t** **S **M impl*m*nt*tion o* ***rypt_in_pl***_**t*****, t** ***rypt** *ip**rt*xt (i.*. t** *orr**t pl*int*xt) is *xpos** *v*n i* t** v*ri*i**tion **ils. ### Imp**t I* * pro*r*m usin* t** `**s-**m` *r*t*'s `***rypt_in_pl****` *PIs **

Reasoning

T** vuln*r**ility st*ms *rom t** ***ryption st*p (vi* *TR k*ystr**m *ppli**tion) o**urrin* ***or* t** v*ri*i**tion in t** `***rypt_in_pl***_**t*****` *un*tion. T*is is *vi**nt *rom t** NIST *ui**lin* *it*tion *n* t** *omp*rison to t** *ix** **S **M-S