In PQUIC before 5bde5bb, retention of unused initial encryption keys allows attackers to disrupt a connection with a PSK configuration by sending a CONNECTION_CLOSE frame that is encrypted via the initial key computed. Network traffic sniffing is needed as part of exploitation.
References
Link | Resource |
---|---|
https://github.com/p-quic/pquic/issues/35 | Issue Tracking |
https://github.com/p-quic/pquic/pull/39 | Patch |
https://www.rfc-editor.org/rfc/rfc9001#name-discarding-unused-keys | Not Applicable |
Configurations
History
No history.
Information
Published : 2024-02-09 10:15
Updated : 2024-02-15 18:44
NVD link : CVE-2024-25679
Mitre link : CVE-2024-25679
CVE.ORG link : CVE-2024-25679
JSON object : View
Products Affected
pquic
- pquic
CWE