The Noise protocol implementation suffers from weakened cryptographic security after encrypting 2^64 messages, and a potential denial of service attack. After 2^64 (~18.4 quintillion) messages are encrypted with the Encrypt function, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce. In a separate issue, the Decrypt function increments the nonce state even when it fails to decrypt a message. If an attacker can provide an invalid input to the Decrypt function, this will cause the nonce state to desynchronize between the peers, resulting in a failure to encrypt all subsequent messages.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Go
Published: 2022-12-27T21:13:53.590Z
Updated: 2024-08-03T17:23:10.118Z
Reserved: 2022-07-29T20:06:51.345Z
Link: CVE-2021-4239
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-12-27T22:15:12.123
Modified: 2024-11-21T06:37:12.730
Link: CVE-2021-4239
Redhat
No data.