Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-4680", "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "state": "PUBLISHED", "assignerShortName": "HashiCorp", "dateReserved": "2023-08-31T15:50:09.764Z", "datePublished": "2023-09-14T23:06:24.546Z", "dateUpdated": "2024-09-26T17:38:48.629Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "platforms": ["64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux"], "product": "Vault", "repo": "https://github.com/hashicorp/vault", "vendor": "HashiCorp", "versions": [{"lessThan": "1.14.3", "status": "affected", "version": "1.14.0", "versionType": "semver"}, {"lessThan": "1.13.7", "status": "affected", "version": "1.13.0", "versionType": "semver"}, {"lessThan": "1.12.11", "status": "affected", "version": "1.12.0", "versionType": "semver"}, {"lessThan": "1.12.0", "status": "affected", "version": "1.6.0", "versionType": "semver"}]}, {"defaultStatus": "unaffected", "platforms": ["64 bit", "32 bit", "x86", "ARM", "MacOS", "Windows", "Linux"], "product": "Vault Enterprise", "repo": "https://github.com/hashicorp/vault", "vendor": "HashiCorp", "versions": [{"lessThan": "1.14.3", "status": "affected", "version": "1.14.0", "versionType": "semver"}, {"lessThan": "1.13.7", "status": "affected", "version": "1.13.0", "versionType": "semver"}, {"lessThan": "1.12.11", "status": "affected", "version": "1.12.0", "versionType": "semver"}, {"lessThan": "1.12.0", "status": "affected", "version": "1.6.0", "versionType": "semver"}]}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>HashiCorp Vault and Vault Enterprise transit secrets engine allowed authorized users to specify arbitrary nonces, even with convergent encryption disabled. The encrypt endpoint, in combination with an offline attack, could be used to decrypt arbitrary ciphertext and potentially derive the authentication subkey when using transit secrets engine without convergent encryption. Introduced in 1.6.0 and fixed in 1.14.3, 1.13.7, and 1.12.11.</p><br/>"}], "value": "HashiCorp Vault and Vault Enterprise transit secrets engine allowed authorized users to specify arbitrary nonces, even with convergent encryption disabled. The encrypt endpoint, in combination with an offline attack, could be used to decrypt arbitrary ciphertext and potentially derive the authentication subkey when using transit secrets engine without convergent encryption. Introduced in 1.6.0 and fixed in 1.14.3, 1.13.7, and 1.12.11."}], "impacts": [{"capecId": "CAPEC-220", "descriptions": [{"lang": "en", "value": "CAPEC-220: Cryptanalysis"}]}], "metrics": [{"cvssV3_1": {"baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-323", "description": "CWE-323: Reusing a Nonce, Key Pair in Encryption", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc", "shortName": "HashiCorp", "dateUpdated": "2024-09-26T17:38:48.629Z"}, "references": [{"url": "https://discuss.hashicorp.com/t/hcsec-2023-28-vault-s-transit-secrets-engine-allowed-nonce-specified-without-convergent-encryption/58249"}], "source": {"advisory": "HCSEC-2023-28", "discovery": "EXTERNAL"}, "title": "Vault's Transit Secrets Engine Allowed Nonce Specified without Convergent Encryption"}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T07:31:06.556Z"}, "title": "CVE Program Container", "references": [{"url": "https://discuss.hashicorp.com/t/hcsec-2023-28-vault-s-transit-secrets-engine-allowed-nonce-specified-without-convergent-encryption/58249", "tags": ["x_transferred"]}]}, {"affected": [{"vendor": "hashicorp", "product": "vault", "cpes": ["cpe:2.3:a:hashicorp:vault:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "1.14.0", "status": "affected", "lessThan": "1.14.3", "versionType": "custom"}, {"version": "1.13.0", "status": "affected", "lessThan": "1.13.7", "versionType": "custom"}, {"version": "1.12.0", "status": "affected", "lessThan": "1.12.11", "versionType": "custom"}, {"version": "1.6.0", "status": "affected", "lessThan": "1.12.0", "versionType": "custom"}]}, {"vendor": "hashicorp", "product": "vault_enterprise", "cpes": ["cpe:2.3:a:hashicorp:vault_enterprise:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "1.14.0", "status": "affected", "lessThan": "1.14.3", "versionType": "custom"}, {"version": "1.13.0", "status": "affected", "lessThan": "1.13.7", "versionType": "custom"}, {"version": "1.12.0", "status": "affected", "lessThan": "1.12.11", "versionType": "custom"}, {"version": "1.6.0", "status": "affected", "lessThan": "1.12.0", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-09-25T19:52:32.242060Z", "id": "CVE-2023-4680", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-25T19:58:36.730Z"}}]}}