Miggo Logo

GHSA-rc4p-p3j9-6577: pypqc private key retrieval vulnerability

8.2

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
2/22/2024
Updated
3/19/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
pypqcpip>= 0.0.4, < 0.0.6.10.0.6.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from division operations (KYBER_Q) in polynomial compression/decompression functions that process secret data. The commit diffs show these functions were patched to replace divisions with constant-time arithmetic (e.g., 80635*()>>28 instead of /KYBER_Q). These functions are explicitly called out in KyberSlash1/KyberSlash2 disclosures and CVE analysis. The affected functions handle private key material during decapsulation, making them high-confidence candidates for the vulnerability source.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t `ky**r***`, `ky**r***`, *n* `ky**r****` only: *n *tt**k*r **l* to su*mit m*ny ****psul*tion r*qu*sts ***inst * sin*l* priv*t* k*y, *n* to **in timin* in*orm*tion **out t** ****psul*tion, *oul* r**ov*r t** priv*t* k*y. Proo*-o*-*on**pt *xpl

Reasoning

T** vuln*r**ility st*ms *rom *ivision op*r*tions (KY**R_Q) in polynomi*l *ompr*ssion/***ompr*ssion *un*tions t**t pro**ss s**r*t **t*. T** *ommit *i**s s*ow t**s* *un*tions w*r* p*t**** to r*pl*** *ivisions wit* *onst*nt-tim* *rit*m*ti* (*.*., ******