Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXczaGotd3IycS14ODNn
Discovery uses the same AES/GCM Nonce throughout the session
Discovery uses the same AES/GCM Nonce throughout the session though it should be generated on per message basis which can lead to the leaking of the session key. As the actual ENR record is signed with a different key it is not possible for an attacker to alter the ENR record. Note that the node private key is not compromised, only the session key generated to communicate with an individual peer.
From discovery spec:
Permalink: https://github.com/advisories/GHSA-w3hj-wr2q-x83gThe number of messages which can be encrypted with a certain session key is limited because encryption of each message requires a unique nonce for AES-GCM. In addition to the keys, the session cache must also keep track of the count of outgoing messages to ensure the uniqueness of nonce values. Since the wire protocol uses 96 bit AES-GCM nonces, it is strongly recommended to generate them by encoding the current outgoing message count into the first 32 bits of the nonce and filling the remaining 64 bits with random data generated by a cryptographically secure random number generator.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXczaGotd3IycS14ODNn
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: over 3 years ago
Updated: almost 2 years ago
Identifiers: GHSA-w3hj-wr2q-x83g
References:
- https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83g
- https://github.com/advisories/GHSA-w3hj-wr2q-x83g
Blast Radius: 1.0
Affected Packages
maven:tech.pegasys.discovery:discovery
Affected Version Ranges: < 0.4.5Fixed in: 0.4.5