Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Use of a Broken or Risky Cryptographic Algorithm vulnerabilities in an interactive lesson.
Start learningUpgrade tech.kwik:kwik
to version 0.8 or higher.
Affected versions of this package are vulnerable to Use of a Broken or Risky Cryptographic Algorithm due to the discard
process. An attacker can exploit this vulnerability by leveraging unused encryption keys.
Attackers must be able to sniff the network traffic.
Capture the first QUIC packets sent by a QUIC client.
Compute the Initial encryption key as described in https://www.rfc-editor.org/rfc/rfc9001.html#name-keys
Send a CONNECTION_CLOSE
frame to the server in an initial packet encrypted using the computed initial encryption key.
Because the server does not discard the Initial keys, it will decrypt and process the Initial packet sent in (4) even after the QUIC handshake is completed.