漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
strongMan vulnerable to private credential recovery due to key and counter reuse
Vulnerability Description
strongMan is a management interface for strongSwan, an OpenSource IPsec-based VPN. When storing credentials in the database (private keys, EAP secrets), strongMan encrypts the corresponding database fields. So far it used AES in CTR mode with a global database key. Together with an initialization vector (IV), a key stream is generated to encrypt the data in the database fields. But because strongMan did not generate individual IVs, every database field was encrypted using the same key stream. An attacker that has access to the database can use this to recover the encrypted credentials. In particular, because certificates, which have to be considered public information, are also encrypted using the same mechanism, an attacker can directly recover a large chunk of the key stream, which allows them to decrypt basically all other secrets especially ECDSA private keys and EAP secrets, which are usually a lot shorter. Version 0.2.0 fixes the issue by switching to AES-GCM-SIV encryption with a random nonce and an individually derived encryption key, using HKDF, for each encrypted value. Database migrations are provided to automatically re-encrypt all credentials.
CVSS Information
N/A
Vulnerability Type
在加密中重用Nonce与密钥对
Vulnerability Title
strongMan 安全漏洞
Vulnerability Description
strongMan是strongSwan开源的一个接口。 strongMan 0.2.0之前版本存在安全漏洞,该漏洞源于加密数据库字段时未生成单独的初始化向量,可能导致凭据泄露。
CVSS Information
N/A
Vulnerability Type
N/A