CVE-2022-35928: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in paulej AESCrypt
AES Crypt is a file encryption software for multiple platforms. AES Crypt for Linux built using the source on GitHub and having the version number 3.11 has a vulnerability with respect to reading user-provided passwords and confirmations via command-line prompts. Passwords lengths were not checked before being read. This vulnerability may lead to buffer overruns. This does _not_ affect source code found on aescrypt.com, nor is the vulnerability present when providing a password or a key via the `-p` or `-k` command-line options. The problem was fixed via in commit 68761851b and will be included in release 3.16. Users are advised to upgrade. Users unable to upgrade should us the `-p` or `-k` options to provide a password or key.
AI Analysis
Technical Summary
CVE-2022-35928 is a medium-severity buffer overflow vulnerability identified in version 3.11 of AESCrypt for Linux, a file encryption software developed by paulej. The vulnerability arises from improper handling of user-provided passwords and password confirmations when entered interactively via command-line prompts. Specifically, the software does not validate the length of the input before reading it into a fixed-size buffer, leading to a classic buffer overflow (CWE-120). This flaw can cause memory corruption, potentially allowing an attacker to execute arbitrary code or cause a denial of service by crashing the application. Importantly, this vulnerability does not affect the official source code distributed on aescrypt.com, nor does it impact the use of passwords or keys supplied directly via the '-p' or '-k' command-line options. The issue was addressed in a code commit (68761851b) and will be fixed in the upcoming release 3.16. Until users upgrade, it is recommended to avoid interactive password prompts and instead supply credentials via the secure command-line options. No known exploits have been reported in the wild, and the vulnerability requires local user interaction to trigger, as it involves entering passwords at the prompt. The flaw affects only version 3.11 of the Linux build compiled from GitHub sources, limiting its scope. However, given the nature of buffer overflows, exploitation could lead to compromise of confidentiality, integrity, and availability of encrypted data or the host system running AESCrypt.
Potential Impact
For European organizations, the impact of this vulnerability depends on the adoption of the affected AESCrypt version 3.11 Linux build compiled from GitHub sources. Organizations using this specific build for file encryption could face risks of local privilege escalation or denial of service if an attacker can trick users into entering overly long passwords at the prompt. This could lead to unauthorized code execution or crashes, potentially exposing sensitive encrypted data or disrupting business operations. Since AESCrypt is used for file encryption, compromise could undermine data confidentiality and integrity. However, the vulnerability requires local access and user interaction, limiting remote exploitation risks. The absence of known exploits reduces immediate threat, but targeted attacks against organizations relying on this software version remain possible. European sectors with high reliance on open-source encryption tools, such as research institutions, software development firms, and certain government agencies, may be more vulnerable. Additionally, organizations with strict data protection requirements under GDPR could face compliance risks if encrypted data is compromised due to this flaw.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately upgrade AESCrypt to version 3.16 or later once available, as this release includes the fix. 2) Until upgrading, avoid using interactive password prompts in version 3.11; instead, supply passwords or keys using the '-p' or '-k' command-line options, which are not vulnerable. 3) Audit internal software deployment processes to identify any installations of the affected version compiled from GitHub sources, especially on Linux systems. 4) Implement strict local user access controls to prevent untrusted users from running AESCrypt or entering passwords interactively. 5) Monitor logs and system behavior for signs of crashes or anomalous activity related to AESCrypt usage. 6) Educate users about the risks of entering passwords interactively in the affected version and encourage use of secure command-line options. 7) Consider integrating application whitelisting and endpoint protection to detect exploitation attempts involving buffer overflows. These targeted steps go beyond generic advice by focusing on the specific vulnerable version, usage patterns, and deployment environments relevant to European organizations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain, Belgium
CVE-2022-35928: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in paulej AESCrypt
Description
AES Crypt is a file encryption software for multiple platforms. AES Crypt for Linux built using the source on GitHub and having the version number 3.11 has a vulnerability with respect to reading user-provided passwords and confirmations via command-line prompts. Passwords lengths were not checked before being read. This vulnerability may lead to buffer overruns. This does _not_ affect source code found on aescrypt.com, nor is the vulnerability present when providing a password or a key via the `-p` or `-k` command-line options. The problem was fixed via in commit 68761851b and will be included in release 3.16. Users are advised to upgrade. Users unable to upgrade should us the `-p` or `-k` options to provide a password or key.
AI-Powered Analysis
Technical Analysis
CVE-2022-35928 is a medium-severity buffer overflow vulnerability identified in version 3.11 of AESCrypt for Linux, a file encryption software developed by paulej. The vulnerability arises from improper handling of user-provided passwords and password confirmations when entered interactively via command-line prompts. Specifically, the software does not validate the length of the input before reading it into a fixed-size buffer, leading to a classic buffer overflow (CWE-120). This flaw can cause memory corruption, potentially allowing an attacker to execute arbitrary code or cause a denial of service by crashing the application. Importantly, this vulnerability does not affect the official source code distributed on aescrypt.com, nor does it impact the use of passwords or keys supplied directly via the '-p' or '-k' command-line options. The issue was addressed in a code commit (68761851b) and will be fixed in the upcoming release 3.16. Until users upgrade, it is recommended to avoid interactive password prompts and instead supply credentials via the secure command-line options. No known exploits have been reported in the wild, and the vulnerability requires local user interaction to trigger, as it involves entering passwords at the prompt. The flaw affects only version 3.11 of the Linux build compiled from GitHub sources, limiting its scope. However, given the nature of buffer overflows, exploitation could lead to compromise of confidentiality, integrity, and availability of encrypted data or the host system running AESCrypt.
Potential Impact
For European organizations, the impact of this vulnerability depends on the adoption of the affected AESCrypt version 3.11 Linux build compiled from GitHub sources. Organizations using this specific build for file encryption could face risks of local privilege escalation or denial of service if an attacker can trick users into entering overly long passwords at the prompt. This could lead to unauthorized code execution or crashes, potentially exposing sensitive encrypted data or disrupting business operations. Since AESCrypt is used for file encryption, compromise could undermine data confidentiality and integrity. However, the vulnerability requires local access and user interaction, limiting remote exploitation risks. The absence of known exploits reduces immediate threat, but targeted attacks against organizations relying on this software version remain possible. European sectors with high reliance on open-source encryption tools, such as research institutions, software development firms, and certain government agencies, may be more vulnerable. Additionally, organizations with strict data protection requirements under GDPR could face compliance risks if encrypted data is compromised due to this flaw.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately upgrade AESCrypt to version 3.16 or later once available, as this release includes the fix. 2) Until upgrading, avoid using interactive password prompts in version 3.11; instead, supply passwords or keys using the '-p' or '-k' command-line options, which are not vulnerable. 3) Audit internal software deployment processes to identify any installations of the affected version compiled from GitHub sources, especially on Linux systems. 4) Implement strict local user access controls to prevent untrusted users from running AESCrypt or entering passwords interactively. 5) Monitor logs and system behavior for signs of crashes or anomalous activity related to AESCrypt usage. 6) Educate users about the risks of entering passwords interactively in the affected version and encourage use of secure command-line options. 7) Consider integrating application whitelisting and endpoint protection to detect exploitation attempts involving buffer overflows. These targeted steps go beyond generic advice by focusing on the specific vulnerable version, usage patterns, and deployment environments relevant to European organizations.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3a61
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/23/2025, 12:22:04 AM
Last updated: 7/31/2025, 1:33:30 PM
Views: 15
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.