Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed.
Nonces should be used for the present occasion and only once.
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Link | Tags |
---|---|
https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83g | vendor advisory |
https://github.com/advisories/GHSA-w3hj-wr2q-x83g | third party advisory |
https://vulncheck.com/advisories/vc-advisory-GHSA-w3hj-wr2q-x83g | third party advisory |