Vulnerability Details : CVE-2018-6829
Potential exploit
cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.
Products affected by CVE-2018-6829
- cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-6829
0.84%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 73 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-6829
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2018-6829
-
The product uses a broken or risky cryptographic algorithm or protocol.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-6829
-
https://www.oracle.com/security-alerts/cpujan2020.html
Oracle Critical Patch Update Advisory - January 2020
-
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
Home · weikengchen/attack-on-libgcrypt-elgamal Wiki · GitHubExploit;Third Party Advisory
-
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
Attack on libgcrypt's ElGamal Encryption with Proof of Concept (PoC)Issue Tracking;Third Party Advisory
-
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
GitHub - weikengchen/attack-on-libgcrypt-elgamal: Attack on the ElGamal Implementation of libgcryptThird Party Advisory
Jump to