5.9
CVE-2021-40530
- EPSS 0.26%
- Veröffentlicht 06.09.2021 19:15:07
- Zuletzt bearbeitet 21.11.2024 06:24:20
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
| Typ | Quelle | Score | Percentile | 
|---|---|---|---|
| EPSS | FIRST.org | 0.26% | 0.461 | 
| Quelle | Base Score | Exploit Score | Impact Score | Vector String | 
|---|---|---|---|---|
| nvd@nist.gov | 5.9 | 2.2 | 3.6 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N  | 
| nvd@nist.gov | 2.6 | 4.9 | 2.9 | AV:N/AC:H/Au:N/C:P/I:N/A:N  | 
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
The product uses a broken or risky cryptographic algorithm or protocol.