Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23688: CWE-323 Reusing a Nonce, Key Pair in Encryption

0
Medium
VulnerabilityCVE-2024-23688cvecve-2024-23688cwe-323
Published: Fri Jan 19 2024 (01/19/2024, 21:26:35 UTC)
Source: CVE Database V5

Description

Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed.

AI-Powered Analysis

AILast updated: 11/29/2025, 02:53:06 UTC

Technical Analysis

CVE-2024-23688 identifies a cryptographic vulnerability in Consensys Discovery versions earlier than 0.4.5, where the AES/GCM encryption implementation incorrectly reuses the same nonce for the entire session instead of generating a unique nonce for each encrypted message. AES/GCM requires a unique nonce per message to maintain semantic security; nonce reuse can lead to catastrophic cryptographic failures, including the potential recovery of the encryption key or plaintext data. In this case, the vulnerability exposes the session key used for peer-to-peer communication, which could allow an attacker to decrypt intercepted messages within that session. Importantly, the node's private key is not compromised, limiting the scope of the breach to session confidentiality. The vulnerability can be exploited remotely without authentication or user interaction, increasing the risk profile. Although no known exploits have been reported in the wild, the cryptographic flaw represents a significant weakness in secure communications within affected blockchain or decentralized network environments. The CVSS v3.1 base score is 5.3 (medium), reflecting the network attack vector, no required privileges or user interaction, and limited confidentiality impact without integrity or availability loss. No official patches were linked at the time of reporting, but upgrading to version 0.4.5 or later is recommended to resolve the nonce reuse issue. This vulnerability is classified under CWE-323 (Reusing a Nonce, Key Pair in Encryption), emphasizing the importance of nonce uniqueness in cryptographic protocols.

Potential Impact

For European organizations, particularly those involved in blockchain development, decentralized applications, or peer-to-peer networking using Consensys Discovery, this vulnerability poses a risk to the confidentiality of session communications. Attackers capable of intercepting network traffic could exploit nonce reuse to recover session keys and decrypt sensitive data exchanged between nodes. While the node's private keys remain secure, exposure of session keys could lead to unauthorized data disclosure, undermining trust and privacy in blockchain operations. This may affect financial transactions, identity verification processes, or any sensitive data transmitted over the affected sessions. The impact is primarily confidentiality loss without direct effects on data integrity or system availability. Organizations relying on Consensys Discovery for critical infrastructure or regulatory compliance (e.g., GDPR) must consider the risk of data exposure and potential legal consequences. The absence of known exploits reduces immediate urgency but does not eliminate the threat, especially given the ease of remote exploitation without authentication. Failure to address this vulnerability could result in reputational damage and operational risks in the European blockchain ecosystem.

Mitigation Recommendations

1. Upgrade Consensys Discovery to version 0.4.5 or later immediately, as this version addresses the nonce reuse vulnerability. 2. If upgrading is temporarily not possible, implement network-level protections such as encrypted VPN tunnels or secure transport layers to reduce the risk of traffic interception. 3. Conduct a thorough audit of cryptographic implementations in all blockchain and peer-to-peer communication components to ensure nonce uniqueness and adherence to AES/GCM best practices. 4. Monitor network traffic for unusual patterns that could indicate attempts to exploit cryptographic weaknesses. 5. Educate development and security teams on the importance of nonce management in encryption schemes to prevent similar vulnerabilities. 6. Engage with Consensys support or community forums to track patch releases and vulnerability disclosures. 7. Implement strict key management policies to limit the lifespan and scope of session keys, reducing exposure windows. 8. Consider deploying intrusion detection systems capable of identifying anomalous decryption attempts or traffic analysis.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2024-01-19T17:35:09.985Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692a5c732a13ea799fd8c866

Added to database: 11/29/2025, 2:37:39 AM

Last enriched: 11/29/2025, 2:53:06 AM

Last updated: 12/4/2025, 7:34:22 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats