CVE-2021-4239

Source
https://cve.org/CVERecord?id=CVE-2021-4239
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-4239.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-4239
Aliases
Downstream
Published
2022-12-27T22:15:12.123Z
Modified
2026-03-14T14:58:40.244533Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

The Noise protocol implementation suffers from weakened cryptographic security after encrypting 2^64 messages, and a potential denial of service attack. After 2^64 (~18.4 quintillion) messages are encrypted with the Encrypt function, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce. In a separate issue, the Decrypt function increments the nonce state even when it fails to decrypt a message. If an attacker can provide an invalid input to the Decrypt function, this will cause the nonce state to desynchronize between the peers, resulting in a failure to encrypt all subsequent messages.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-4239.json"