Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-8929— Ciphertext integrity weakness in Tink

CVSS 5.3 · Medium EPSS 0.08% · P24
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-8929

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Ciphertext integrity weakness in Tink
Source: NVD (National Vulnerability Database)
Vulnerability Description
A mis-handling of invalid unicode characters in the Java implementation of Tink versions prior to 1.5 allows an attacker to change the ID part of a ciphertext, which result in the creation of a second ciphertext that can decrypt to the same plaintext. This can be a problem with encrypting deterministic AEAD with a single key, and rely on a unique ciphertext-per-plaintext.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
Unicode编码处理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Tink 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Tink是美国谷歌(Google)的一个多语言跨平台的提供加密 API 的一个开发库。 Tink 1.5之前版本存在安全漏洞,该漏洞源于对无效unicode字符的错误处理,攻击者可利用该漏洞更改密文的ID部分,这将导致创建第二个密文,该密文可以解密为相同的明文。这可能是使用单个密钥加密确定性AEAD时的一个问题,并且依赖于每明文唯一的密文。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Google LLCTink stable ~ 1.5 -

II. Public POCs for CVE-2020-8929

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-8929

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2020-8929

No comments yet


Leave a comment