The Noise protocol implementation suffers from weakened cryptographic security after encrypting 2^64 messages, and a potential denial of service attack. After 2^64 (~18.4 quintillion) messages are encrypted with the Encrypt function, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce. In a separate issue, the Decrypt function increments the nonce state even when it fails to decrypt a message. If an attacker can provide an invalid input to the Decrypt function, this will cause the nonce state to desynchronize between the peers, resulting in a failure to encrypt all subsequent messages.
History

Mon, 14 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2025-04-14T16:59:43.688Z

Reserved: 2022-07-29T20:06:51.345Z

Link: CVE-2021-4239

cve-icon Vulnrichment

Updated: 2024-08-03T17:23:10.118Z

cve-icon NVD

Status : Modified

Published: 2022-12-27T22:15:12.123

Modified: 2025-04-14T17:15:24.963

Link: CVE-2021-4239

cve-icon Redhat

No data.