CVE-2023-46133

CryptoES is a cryptography algorithms library compatible with ES6 and TypeScript. Prior to version 2.1.0, CryptoES PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic hash algorithm considered insecure since at least 2005, and defaults to one single iteration, a 'strength' or 'difficulty' value specified at 1,000 when specified in 1993. PBKDF2 relies on iteration count as a countermeasure to preimage and collision attacks. If used to protect passwords, the impact is high. If used to generate signatures, the impact is high. Version 2.1.0 contains a patch for this issue. As a workaround, configure CryptoES to use SHA256 with at least 250,000 iterations.
Configurations

Configuration 1 (hide)

cpe:2.3:a:entronad:cryptoes:*:*:*:*:*:node.js:*:*

History

08 Nov 2023, 14:14

Type Values Removed Values Added
First Time Entronad
Entronad cryptoes
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
CWE CWE-327
CPE cpe:2.3:a:entronad:cryptoes:*:*:*:*:*:node.js:*:*
References (MISC) https://github.com/entronad/crypto-es/security/advisories/GHSA-mpj8-q39x-wq5h - (MISC) https://github.com/entronad/crypto-es/security/advisories/GHSA-mpj8-q39x-wq5h - Exploit, Vendor Advisory
References (MISC) https://github.com/entronad/crypto-es/commit/d506677fae3d03a454b37ad126e0c119d416b757 - (MISC) https://github.com/entronad/crypto-es/commit/d506677fae3d03a454b37ad126e0c119d416b757 - Patch

25 Oct 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-25 21:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-46133

Mitre link : CVE-2023-46133

CVE.ORG link : CVE-2023-46133


JSON object : View

Products Affected

entronad

  • cryptoes
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm

CWE-328

Reversible One-Way Hash

CWE-916

Use of Password Hash With Insufficient Computational Effort