Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2411 | aes-gcm is a pure Rust implementation of the AES-GCM. Starting in version 0.10.0 and prior to version 0.10.3, in the AES GCM implementation of decrypt_in_place_detached, the decrypted ciphertext (i.e. the correct plaintext) is exposed even if tag verification fails. If a program using the `aes-gcm` crate's `decrypt_in_place*` APIs accesses the buffer after decryption failure, it will contain a decryption of an unauthenticated input. Depending on the specific nature of the program this may enable Chosen Ciphertext Attacks (CCAs) which can cause a catastrophic breakage of the cipher including full plaintext recovery. Version 0.10.3 contains a fix for this issue. |
Github GHSA |
GHSA-423w-p2w9-r7vq | AEADs/aes-gcm: Plaintext exposed in decrypt_in_place_detached even on tag verification failure |
Wed, 18 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-18T14:22:56.534Z
Reserved: 2023-09-14T16:13:33.307Z
Link: CVE-2023-42811
Updated: 2024-08-02T19:30:24.555Z
Status : Modified
Published: 2023-09-22T16:15:10.583
Modified: 2024-11-21T08:23:15.670
Link: CVE-2023-42811
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA