Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20327PUBLISHED: 2021-02-25
A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node....
CVE-2021-20328PUBLISHED: 2021-02-25
Specific versions of the Java driver that support client-side field level encryption (CSFLE) fail to perform correct host name verification on the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in inte...
CVE-2020-27543PUBLISHED: 2021-02-25The restify-paginate package 0.0.5 for Node.js allows remote attackers to cause a Denial-of-Service by omitting the HTTP Host header. A Restify-based web service would crash with an uncaught exception.
CVE-2020-23534PUBLISHED: 2021-02-25A server-side request forgery (SSRF) vulnerability in Upgrade.php of gopeak masterlab 2.1.5, via the 'source' parameter.
CVE-2021-27330PUBLISHED: 2021-02-25Triconsole Datepicker Calendar <3.77 is affected by cross-site scripting (XSS) in calendar_form.php. Attackers can read authentication cookies that are still active, which can be used to perform further attacks such as reading browser history, directory listings, and file contents.
User Rank: Author
7/23/2020 | 1:27:51 PM
In the text and linked BlackHat synopsis, the author describes how multiple messages under an AEAD scheme like AES-GCM can be decrypted successfully by multiple keys. I'd say it is unsurprising they decrypt (any key will decrypt the message, just most of the messages would be garbage), but for the security properties of any AEAD construction to hold, the authentication tag should be invalid for the message afterwards. The text reads like the author may have found a way where in specific constructions this is not the case, so I am very excited to read more details about the attack.
The number one reason why I love applied cryptography. You never stop learning :-)
Best, Johannes