| 标题 | Cesanta Mongoose 7.20 Improper Verification of Cryptographic Signature |
|---|
| 描述 | The mg_aes_gcm_decrypt() function in /src/tls_aes128.c never verifies the GCM authentication tag during decryption, completely bypassing the authentication guarantee of the AEAD cipher. The function's signature does not even accept a tag or associated data (AAD) parameter, and internally hardcodes tag_len = 0 and tag_buf = NULL. By contrast, the corresponding mg_aes_gcm_encrypt() function correctly accepts and generates tags with AAD, creating a stark asymmetry where outgoing records are properly tagged but incoming records are never authenticated. Because AES-GCM uses AES-CTR mode for encryption, this allows a man-in-the-middle attacker to perform bit-flipping attacks on any TLS record, modifying encrypted data in transit with byte-level precision, and the device running Mongoose will accept the tampered record as authentic. This renders TLS connections using the built-in TLS implementation with AES-128-GCM completely unauthenticated.
Vendor was made aware of the vulnerability and a patch was released in version 7.21 |
|---|
| 来源 | ⚠️ https://github.com/dwBruijn/CVEs/blob/main/Mongoose/AESGCM.md |
|---|
| 用户 | dwbruijn (UID 93926) |
|---|
| 提交 | 2026-04-03 07時25分 (23 日前) |
|---|
| 管理 | 2026-04-24 21時13分 (22 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 359529 [Cesanta Mongoose 直到 7.20 GCM Authentication Tag /src/tls_aes128.c mg_aes_gcm_decrypt 弱身份验证] |
|---|
| 积分 | 20 |
|---|