Keystream Cycling Issue in Go Cryptography Library Affecting Encryption and Random Number Generation
CVE-2019-11840

5.9MEDIUM

Key Information:

Vendor

Golang

Status
Vendor
CVE Published:
9 May 2019

What is CVE-2019-11840?

A flaw in the amd64 implementation of the Go cryptography library's salsa20 and salsa packages can lead to significant security risks. When more than 256 GiB of keystream is produced or when the counter exceeds 32 bits, the library erroneously generates output, which can repeat previously produced keystream bytes. This predictability can severely undermine the confidentiality of encryption applications and compromise the randomness in Cryptographically Secure Pseudo-Random Number Generators (CSPRNG), making data vulnerable to unauthorized access.

References

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.