Consensys Discovery: Reuse of AES/GCM Nonce in Session Key Vulnerability

Consensys Discovery: Reuse of AES/GCM Nonce in Session Key Vulnerability

CVE-2024-23688 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed.

Learn more about our Web Application Penetration Testing UK.