Impact
The vulnerability resides in the SM2 decryption routine of the Botan cryptographic library. It stems from a missing validation of the C3 authentication code length before comparison. Maliciously crafted ciphertexts with an undersized C3 field can trigger a heap over‑read of up to 31 bytes, leading to an application crash or other undefined behavior.
Affected Systems
RandomBit Botan library versions 2.3.0 through 3.10.x are affected. The flaw has been fixed in Botan 3.11.0 and later.
Risk and Exploitability
With a CVSS score of 8.2, the vulnerability is considered high severity. EPSS data is not available and the issue is not listed in the KEV catalog, but the potential for a crash or memory corruption could be exploited by an attacker providing a malformed SM2 ciphertext. The attack vector is likely through any application that accepts SM2 ciphertexts from untrusted sources. Upgrading to the patched version mitigates this risk.
OpenCVE Enrichment