提出 #757091: Cesanta Mongoose Embedded Web Server 7.20 Improper Verification of Cryptographic Signature情報

タイトルCesanta Mongoose Embedded Web Server 7.20 Improper Verification of Cryptographic Signature
説明The mg_chacha20_poly1305_decrypt() function in /src/tls_chacha20.c never computes or verifies the Poly1305 authentication tag during decryption, completely bypassing the authentication guarantee of the AEAD cipher. Because ChaCha20 is a stream cipher, this allows a man-in-the-middle attacker to perform bit-flipping attacks on any TLS record, thus modifying encrypted data in transit with byte-level precision, and the Mongoose server will accept the tampered record as authentic. This renders TLS connections using the built-in TLS implementation completely unauthenticated. Vendor recognizes that this is a serious vulnerability but is incapable or unwilling to fix it.
ソース⚠️ https://github.com/dwBruijn/CVEs/blob/main/Mongoose/ChaCha20Poly1305.md
ユーザー
 dwbruijn (UID 93926)
送信2026年02月12日 08:26 (2 月 ago)
モデレーション2026年02月22日 08:57 (10 days later)
ステータス承諾済み
VulDBエントリ347335 [Cesanta Mongoose 迄 7.20 Poly1305 Authentication Tag /src/tls_chacha20.c mg_chacha20_poly1305_decrypt 弱い認証]
ポイント20

Might our Artificial Intelligence support you?

Check our Alexa App!