CVE-2024-23688

Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed.
Configurations

Configuration 1 (hide)

cpe:2.3:a:consensys:discovery:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-01-19 22:15

Updated : 2024-01-26 15:53


NVD link : CVE-2024-23688

Mitre link : CVE-2024-23688

CVE.ORG link : CVE-2024-23688


JSON object : View

Products Affected

consensys

  • discovery
CWE
CWE-330

Use of Insufficiently Random Values

CWE-323

Reusing a Nonce, Key Pair in Encryption