PyPinkSign v0.5.1 uses a non-random or static IV for Cipher Block Chaining (CBC) mode in AES encryption. This vulnerability can lead to the disclosure of information and communications.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0218 | PyPinkSign v0.5.1 uses a non-random or static IV for Cipher Block Chaining (CBC) mode in AES encryption. This vulnerability can lead to the disclosure of information and communications. |
Github GHSA |
GHSA-fxff-wxxv-c2jc | PyPinkSign uses a non-random or static IV for Cipher Block Chaining (CBC) mode in AES encryption |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 07 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-07T18:45:49.208Z
Reserved: 2023-11-13T00:00:00.000Z
Link: CVE-2023-48056
Updated: 2024-08-02T21:23:37.927Z
Status : Modified
Published: 2023-11-16T18:15:07.440
Modified: 2024-11-21T08:31:03.290
Link: CVE-2023-48056
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA