A vulnerability was found in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 where, A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by leveraging the reuse of a nonce in a session. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1759 | Issue Tracking Patch Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3A2UFR5IUIEXJUCF64GQ5OVLCZGODXE/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202105-39 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2020-04-13 06:15
Updated : 2021-08-04 10:15
NVD link : CVE-2020-1759
Mitre link : CVE-2020-1759
JSON object : View
CWE
CWE-323
Reusing a Nonce, Key Pair in Encryption
Products Affected
redhat
- openstack
- openshift
- ceph_storage
fedoraproject
- fedora
linuxfoundation
- ceph