CVE-2026-24785

Source
https://cve.org/CVERecord?id=CVE-2026-24785
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-24785.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-24785
Aliases
Published
2026-01-27T23:38:53.409Z
Modified
2026-01-30T22:50:32.448906Z
Severity
  • 8.0 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
Clatter has a PSK Validity Rule Violation issue
Details

Clatter is a nostd compatible, pure Rust implementation of the Noise protocol framework with post-quantum support. Versiosn prior to2.2.0 have a protocol compliance vulnerability. The library allowed post-quantum handshake patterns that violated the PSK validity rule (Noise Protocol Framework Section 9.3). This could allow PSK-derived keys to be used for encryption without proper randomization by self-chosen ephemeral randomness, weakening security guarantees and potentially allowing catastrophic key reuse. Affected default patterns include noise_pqkk_psk0, noise_pqkn_psk0, noise_pqnk_psk0, noise_pqnn_psk0``, and some hybrid variants. Users of these patterns may have been using handshakes that do not meet the intended security properties. The issue is fully patched and released in Clatter v2.2.0. The fixed version includes runtime checks to detect offending handshake patterns. As a workaround, avoid using offending*psk0` variants of post-quantum patterns. Review custom handshake patterns carefully.

Database specific
{
    "cwe_ids": [
        "CWE-327"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/24xxx/CVE-2026-24785.json"
}
References

Affected packages

Git / github.com/jmlepisto/clatter

Affected ranges

Type
GIT
Repo
https://github.com/jmlepisto/clatter
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

clatter-v0.*
clatter-v0.1.1-alpha
clatter-v0.1.2-alpha
clatter-v1.*
clatter-v1.0.0
clatter-v1.0.0-rc.1
clatter-v1.0.0-rc.2
clatter-v1.1.0
clatter-v2.*
clatter-v2.0.0
clatter-v2.0.0-rc.2
clatter-v2.1.0
clatter-v2.1.0-rc.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-24785.json"