Use of a Broken or Risky Cryptographic Algorithm Affecting tech.kwik:kwik package, versions [,0.8)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use of a Broken or Risky Cryptographic Algorithm vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-TECHKWIK-7116681
  • published26 May 2024
  • disclosed24 May 2024
  • creditUnknown

Introduced: 24 May 2024

CVE-2024-22588  (opens in a new tab)
CWE-327  (opens in a new tab)

How to fix?

Upgrade tech.kwik:kwik to version 0.8 or higher.

Overview

Affected versions of this package are vulnerable to Use of a Broken or Risky Cryptographic Algorithm due to the discard process. An attacker can exploit this vulnerability by leveraging unused encryption keys.

PoC

  1. Attackers must be able to sniff the network traffic.

  2. Capture the first QUIC packets sent by a QUIC client.

  3. Compute the Initial encryption key as described in https://www.rfc-editor.org/rfc/rfc9001.html#name-keys

  4. Send a CONNECTION_CLOSE frame to the server in an initial packet encrypted using the computed initial encryption key.

  5. Because the server does not discard the Initial keys, it will decrypt and process the Initial packet sent in (4) even after the QUIC handshake is completed.

CVSS Scores

version 3.1