Use of a Broken or Risky Cryptographic Algorithm Affecting tech.kwik:kwik package, versions [,0.8)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    Exploit Maturity
    Proof of concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-TECHKWIK-7116681
  • published 26 May 2024
  • disclosed 24 May 2024
  • credit Unknown

How to fix?

Upgrade tech.kwik:kwik to version 0.8 or higher.

Overview

Affected versions of this package are vulnerable to Use of a Broken or Risky Cryptographic Algorithm due to the discard process. An attacker can exploit this vulnerability by leveraging unused encryption keys.

PoC

  1. Attackers must be able to sniff the network traffic.

  2. Capture the first QUIC packets sent by a QUIC client.

  3. Compute the Initial encryption key as described in https://www.rfc-editor.org/rfc/rfc9001.html#name-keys

  4. Send a CONNECTION_CLOSE frame to the server in an initial packet encrypted using the computed initial encryption key.

  5. Because the server does not discard the Initial keys, it will decrypt and process the Initial packet sent in (4) even after the QUIC handshake is completed.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
5.3 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    None
  • Integrity (I)
    Low
  • Availability (A)
    None