CVE-2023-46133

Public Exploit
crypto-es PBKDF2 1,000 times weaker than specified in 1993 and 1.3M times weaker than current standard

Description

CryptoES is a cryptography algorithms library compatible with ES6 and TypeScript. Prior to version 2.1.0, CryptoES PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic hash algorithm considered insecure since at least 2005, and defaults to one single iteration, a 'strength' or 'difficulty' value specified at 1,000 when specified in 1993. PBKDF2 relies on iteration count as a countermeasure to preimage and collision attacks. If used to protect passwords, the impact is high. If used to generate signatures, the impact is high. Version 2.1.0 contains a patch for this issue. As a workaround, configure CryptoES to use SHA256 with at least 250,000 iterations.

Categories

9.1
CVSS
Severity: Critical
CVSS 3.1 •
EPSS 0.18%
Vendor Advisory github.com
Affected: entronad crypto-es
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-46133?
CVE-2023-46133 has been scored as a critical severity vulnerability.
How to fix CVE-2023-46133?
To fix CVE-2023-46133, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2023-46133 being actively exploited in the wild?
It is possible that CVE-2023-46133 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-46133?
CVE-2023-46133 affects entronad crypto-es.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.