Skip to content

pubnub Insufficient Entropy vulnerability

Moderate severity GitHub Reviewed Published Dec 6, 2023 to the GitHub Advisory Database • Updated May 20, 2024

Package

nuget Pubnub (NuGet)

Affected versions

< 6.19.0

Patched versions

6.19.0
maven com.pubnub:pubnub (Maven)
<= 4.6.5
None
maven com.pubnub:pubnub-kotlin (Maven)
< 7.7.0
7.7.0
gomod github.com/pubnub/go (Go)
<= 4.10.0
None
gomod github.com/pubnub/go/v5 (Go)
<= 5.0.3
None
gomod github.com/pubnub/go/v6 (Go)
<= 6.1.0
None
gomod github.com/pubnub/go/v7 (Go)
< 7.2.0
7.2.0
swift github.com/pubnub/swift (Swift)
< 6.2.0
6.2.0
npm pubnub (npm)
< 7.4.0
7.4.0
bundler pubnub (RubyGems)
< 5.3.0
5.3.0
cargo pubnub (Rust)
< 0.4.0
0.4.0
pub pubnub (Pub)
< 4.3.0
4.3.0
pip pubnub (pip)
< 7.3.0
7.3.0
composer pubnub/pubnub (Composer)
< 6.1.0
6.1.0

Description

Versions of the package pubnub before 7.4.0; all versions of the package com.pubnub:pubnub; versions of the package pubnub before 6.19.0; all versions of the package github.com/pubnub/go; versions of the package github.com/pubnub/go/v7 before 7.2.0; versions of the package pubnub before 7.3.0; versions of the package pubnub/pubnub before 6.1.0; versions of the package pubnub before 5.3.0; versions of the package pubnub before 0.4.0; versions of the package pubnub/c-core before 4.5.0; versions of the package com.pubnub:pubnub-kotlin before 7.7.0; versions of the package pubnub/swift before 6.2.0; versions of the package pubnub before 5.2.0; versions of the package pubnub before 4.3.0 are vulnerable to Insufficient Entropy via the getKey function, due to inefficient implementation of the AES-256-CBC cryptographic algorithm. The provided encrypt function is less secure when hex encoding and trimming are applied, leaving half of the bits in the key always the same for every encoded message or file.

Note:

In order to exploit this vulnerability, the attacker needs to invest resources in preparing the attack and brute-force the encryption.

References

Published by the National Vulnerability Database Dec 6, 2023
Published to the GitHub Advisory Database Dec 6, 2023
Reviewed Dec 6, 2023
Last updated May 20, 2024

Severity

Moderate
5.9
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Weaknesses

CVE ID

CVE-2023-26154

GHSA ID

GHSA-5844-q3fc-56rh

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.