When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret.

The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.

Project Subscriptions

Vendors Products
Cloudflare Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-1452 When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret. The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.
Github GHSA Github GHSA GHSA-2q89-485c-9j2x Improper random reading in CIRCL
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 27 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cloudflare

Published:

Updated: 2025-01-27T18:32:25.797Z

Reserved: 2023-03-30T15:16:57.957Z

Link: CVE-2023-1732

cve-icon Vulnrichment

Updated: 2024-08-02T05:57:24.987Z

cve-icon NVD

Status : Modified

Published: 2023-05-10T12:15:10.523

Modified: 2024-11-21T07:39:47.283

Link: CVE-2023-1732

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses