CVE-2018-6829

HIGH

Gnupg Libgcrypt < 1.8.2 - Broken Cryptographic Algorithm

Title source: rule
STIX 2.1

Description

cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.

References (4)

Core 4
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
Issue Tracking, Third Party Advisory x_refsource_misc
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html

Scores

CVSS v3 7.5
EPSS 0.0052
EPSS Percentile 66.7%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-327
Status published
Products (1)
gnupg/libgcrypt < 1.8.2
Published Feb 07, 2018
Tracked Since Feb 18, 2026