Versions of the package cocoon before 0.4.0 are vulnerable to Reusing a Nonce, Key Pair in Encryption when the encrypt, wrap, and dump functions are sequentially called. An attacker can generate the same ciphertext by creating a new encrypted message with the same cocoon object.
**Note:**
The issue does NOT affect objects created with Cocoon::new which utilizes ThreadRng.
                
            References
                    Configurations
                    No configuration.
History
                    04 Oct 2024, 13:50
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
02 Oct 2024, 05:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-10-02 05:15
Updated : 2024-10-04 13:50
NVD link : CVE-2024-21530
Mitre link : CVE-2024-21530
CVE.ORG link : CVE-2024-21530
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-323
                        
            Reusing a Nonce, Key Pair in Encryption
