Cryptographic Issues Affecting com.google.crypto.tink:tink Open this link in a new tab package, versions [,1.5.0)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.Test your applications
16 Oct 2020
16 Oct 2020
How to fix?
com.google.crypto.tink:tink to version 1.5.0 or higher.
com.google.crypto.tink:tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
Affected versions of this package are vulnerable to Cryptographic Issues. Under some circumstances it allowed attackers to change the key ID part of the ciphertext, resulting in the attacker creating a second ciphertext that will decrypt to the same plaintext. This can be a problem in particular in the case of encrypting with a deterministic AEAD with a single key, and relying on the fact that there is only a single valid ciphertext per plaintext.
No loss of confidentiality or loss of plaintext integrity occurs due to this problem, only ciphertext integrity is compromised.