Description
Versions of the package cocoon before 0.4.0 are vulnerable to Reusing a Nonce, Key Pair in Encryption when the encrypt, wrap, and dump functions are sequentially called. An attacker can generate the same ciphertext by creating a new encrypted message with the same cocoon object.

**Note:**
The issue does NOT affect objects created with Cocoon::new which utilizes ThreadRng.
Published: 2024-10-02
Score: 4.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-3124 Versions of the package cocoon before 0.4.0 are vulnerable to Reusing a Nonce, Key Pair in Encryption when the encrypt, wrap, and dump functions are sequentially called. An attacker can generate the same ciphertext by creating a new encrypted message with the same cocoon object. **Note:** The issue does NOT affect objects created with Cocoon::new which utilizes ThreadRng.
Github GHSA Github GHSA GHSA-r2jw-c95q-rj29 cocoon Reuses a Nonce, Key Pair in Encryption
Github GHSA Github GHSA GHSA-6878-6wc2-pf5h Sequential calls of encryption API (`encrypt`, `wrap`, and `dump`) result in nonce reuse
History

Wed, 02 Oct 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Cocoon
Cocoon cocoon
CPEs cpe:2.3:a:cocoon:cocoon:*:*:*:*:*:*:*:*
Vendors & Products Cocoon
Cocoon cocoon
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 02 Oct 2024 05:15:00 +0000

Type Values Removed Values Added
Description Versions of the package cocoon before 0.4.0 are vulnerable to Reusing a Nonce, Key Pair in Encryption when the encrypt, wrap, and dump functions are sequentially called. An attacker can generate the same ciphertext by creating a new encrypted message with the same cocoon object. **Note:** The issue does NOT affect objects created with Cocoon::new which utilizes ThreadRng.
Weaknesses CWE-323
References
Metrics cvssV3_1

{'score': 4.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-10-02T13:42:12.774Z

Reserved: 2023-12-22T12:33:20.122Z

Link: CVE-2024-21530

cve-icon Vulnrichment

Updated: 2024-10-02T13:42:07.423Z

cve-icon NVD

Status : Deferred

Published: 2024-10-02T05:15:11.300

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-21530

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses