Cryptographic Issues Affecting com.google.crypto.tink:tink package, versions [,1.5.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (27th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cryptographic Issues vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-COMGOOGLECRYPTOTINK-1018839
  • published16 Oct 2020
  • disclosed16 Oct 2020
  • creditUnknown

Introduced: 16 Oct 2020

CVE-2020-8929  (opens in a new tab)
CWE-310  (opens in a new tab)

How to fix?

Upgrade com.google.crypto.tink:tink to version 1.5.0 or higher.

Overview

com.google.crypto.tink:tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.

Affected versions of this package are vulnerable to Cryptographic Issues. Under some circumstances it allowed attackers to change the key ID part of the ciphertext, resulting in the attacker creating a second ciphertext that will decrypt to the same plaintext. This can be a problem in particular in the case of encrypting with a deterministic AEAD with a single key, and relying on the fact that there is only a single valid ciphertext per plaintext.

No loss of confidentiality or loss of plaintext integrity occurs due to this problem, only ciphertext integrity is compromised.

CVSS Scores

version 3.1