Miggo Logo

GHSA-hrjv-pf36-jpmr:
oqs's Post-Quantum Key Encapsulation Mechanism SIKE broken

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
8/18/2022
Updated
1/7/2023
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
oqsrust< 0.7.20.7.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from fundamental mathematical weaknesses in the SIDH protocol and SIKE implementation identified by Castryck and Decru. The advisory explicitly states these schemes were removed in the patched version. While specific function names aren't shown in diffs, the oqs crate's KEM module structure and RustSec advisory directly reference these Algorithm enum variants as the vulnerable components. The confidence is high because: 1) The schemes were completely removed rather than patched 2) The attack fundamentally breaks the cryptographic security guarantees 3) The advisory specifically calls out these algorithm variants as affected components.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Wout*r **stry*k *n* T*om*s ***ru pr*s*nt** *n ***i*i*nt k*y r**ov*ry *tt**k on t** SI** proto*ol. *s * r*sult, t** s**r*t k*y o* SIK*p*** **n ** r**ov*r** in * m*tt*r o* *ours. T** SIK* *n* SI** s***m*s will ** r*mov** *rom oqs *.*.*. [*n ***i*i*nt

Reasoning

T** vuln*r**ility st*ms *rom *un**m*nt*l m*t**m*ti**l w**kn*ss*s in t** SI** proto*ol *n* SIK* impl*m*nt*tion i**nti*i** *y **stry*k *n* ***ru. T** **visory *xpli*itly st*t*s t**s* s***m*s w*r* r*mov** in t** p*t**** v*rsion. W*il* sp**i*i* *un*tion