aes-gcm is a pure Rust implementation of the AES-GCM. In decrypt_in_place_detached, the decrypted ciphertext (which is the correct ciphertext) is exposed even if the tag is incorrect. This is because in decrypt_inplace in asconcore.rs, tag verification causes an error to be returned with the plaintext contents still in buffer. The vulnerability is fixed in 0.4.3.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 03 Mar 2025 17:00:00 +0000

Type Values Removed Values Added
Description aes-gcm is a pure Rust implementation of the AES-GCM. In decrypt_in_place_detached, the decrypted ciphertext (which is the correct ciphertext) is exposed even if the tag is incorrect. This is because in decrypt_inplace in asconcore.rs, tag verification causes an error to be returned with the plaintext contents still in buffer. The vulnerability is fixed in 0.4.3.
Title AEADs/ascon-aead: Plaintext exposed in decrypt_in_place_detached even on tag verification failure
Weaknesses CWE-347
References
Metrics cvssV4_0

{'score': 5.6, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-03-03T17:32:24.640Z

Reserved: 2025-02-26T18:11:52.304Z

Link: CVE-2025-27498

cve-icon Vulnrichment

Updated: 2025-03-03T17:32:20.576Z

cve-icon NVD

Status : Received

Published: 2025-03-03T17:15:16.443

Modified: 2025-03-03T17:15:16.443

Link: CVE-2025-27498

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.