CVE-2024-23688
5.3MEDIUMConsensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the se
Veröffentlicht: 1/19/2024Aktualisiert: 11/29/2025
Beschreibung
Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed.
KI-AnalyseKI-gestützt
Betroffene Produkte
consensysdiscovery
Referenzen
- https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83gVendor Advisory
- https://github.com/advisories/GHSA-w3hj-wr2q-x83gThird Party Advisory
- https://vulncheck.com/advisories/vc-advisory-GHSA-w3hj-wr2q-x83gThird Party Advisory
- https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83gVendor Advisory
- https://github.com/advisories/GHSA-w3hj-wr2q-x83gThird Party Advisory
- https://vulncheck.com/advisories/vc-advisory-GHSA-w3hj-wr2q-x83gThird Party Advisory