CVE-2024-23688: CWE-323 Reusing a Nonce, Key Pair in Encryption
Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed.
AI Analysis
Technical Summary
CVE-2024-23688 identifies a cryptographic vulnerability in Consensys Discovery versions earlier than 0.4.5, where the AES/GCM encryption implementation incorrectly reuses the same nonce for the entire session instead of generating a unique nonce for each encrypted message. AES/GCM requires a unique nonce per message to maintain semantic security; nonce reuse can lead to catastrophic cryptographic failures, including the potential recovery of the encryption key or plaintext data. In this case, the vulnerability exposes the session key used for peer-to-peer communication, which could allow an attacker to decrypt intercepted messages within that session. Importantly, the node's private key is not compromised, limiting the scope of the breach to session confidentiality. The vulnerability can be exploited remotely without authentication or user interaction, increasing the risk profile. Although no known exploits have been reported in the wild, the cryptographic flaw represents a significant weakness in secure communications within affected blockchain or decentralized network environments. The CVSS v3.1 base score is 5.3 (medium), reflecting the network attack vector, no required privileges or user interaction, and limited confidentiality impact without integrity or availability loss. No official patches were linked at the time of reporting, but upgrading to version 0.4.5 or later is recommended to resolve the nonce reuse issue. This vulnerability is classified under CWE-323 (Reusing a Nonce, Key Pair in Encryption), emphasizing the importance of nonce uniqueness in cryptographic protocols.
Potential Impact
For European organizations, particularly those involved in blockchain development, decentralized applications, or peer-to-peer networking using Consensys Discovery, this vulnerability poses a risk to the confidentiality of session communications. Attackers capable of intercepting network traffic could exploit nonce reuse to recover session keys and decrypt sensitive data exchanged between nodes. While the node's private keys remain secure, exposure of session keys could lead to unauthorized data disclosure, undermining trust and privacy in blockchain operations. This may affect financial transactions, identity verification processes, or any sensitive data transmitted over the affected sessions. The impact is primarily confidentiality loss without direct effects on data integrity or system availability. Organizations relying on Consensys Discovery for critical infrastructure or regulatory compliance (e.g., GDPR) must consider the risk of data exposure and potential legal consequences. The absence of known exploits reduces immediate urgency but does not eliminate the threat, especially given the ease of remote exploitation without authentication. Failure to address this vulnerability could result in reputational damage and operational risks in the European blockchain ecosystem.
Mitigation Recommendations
1. Upgrade Consensys Discovery to version 0.4.5 or later immediately, as this version addresses the nonce reuse vulnerability. 2. If upgrading is temporarily not possible, implement network-level protections such as encrypted VPN tunnels or secure transport layers to reduce the risk of traffic interception. 3. Conduct a thorough audit of cryptographic implementations in all blockchain and peer-to-peer communication components to ensure nonce uniqueness and adherence to AES/GCM best practices. 4. Monitor network traffic for unusual patterns that could indicate attempts to exploit cryptographic weaknesses. 5. Educate development and security teams on the importance of nonce management in encryption schemes to prevent similar vulnerabilities. 6. Engage with Consensys support or community forums to track patch releases and vulnerability disclosures. 7. Implement strict key management policies to limit the lifespan and scope of session keys, reducing exposure windows. 8. Consider deploying intrusion detection systems capable of identifying anomalous decryption attempts or traffic analysis.
Affected Countries
Germany, Netherlands, United Kingdom, France, Switzerland
CVE-2024-23688: CWE-323 Reusing a Nonce, Key Pair in Encryption
Description
Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed.
AI-Powered Analysis
Technical Analysis
CVE-2024-23688 identifies a cryptographic vulnerability in Consensys Discovery versions earlier than 0.4.5, where the AES/GCM encryption implementation incorrectly reuses the same nonce for the entire session instead of generating a unique nonce for each encrypted message. AES/GCM requires a unique nonce per message to maintain semantic security; nonce reuse can lead to catastrophic cryptographic failures, including the potential recovery of the encryption key or plaintext data. In this case, the vulnerability exposes the session key used for peer-to-peer communication, which could allow an attacker to decrypt intercepted messages within that session. Importantly, the node's private key is not compromised, limiting the scope of the breach to session confidentiality. The vulnerability can be exploited remotely without authentication or user interaction, increasing the risk profile. Although no known exploits have been reported in the wild, the cryptographic flaw represents a significant weakness in secure communications within affected blockchain or decentralized network environments. The CVSS v3.1 base score is 5.3 (medium), reflecting the network attack vector, no required privileges or user interaction, and limited confidentiality impact without integrity or availability loss. No official patches were linked at the time of reporting, but upgrading to version 0.4.5 or later is recommended to resolve the nonce reuse issue. This vulnerability is classified under CWE-323 (Reusing a Nonce, Key Pair in Encryption), emphasizing the importance of nonce uniqueness in cryptographic protocols.
Potential Impact
For European organizations, particularly those involved in blockchain development, decentralized applications, or peer-to-peer networking using Consensys Discovery, this vulnerability poses a risk to the confidentiality of session communications. Attackers capable of intercepting network traffic could exploit nonce reuse to recover session keys and decrypt sensitive data exchanged between nodes. While the node's private keys remain secure, exposure of session keys could lead to unauthorized data disclosure, undermining trust and privacy in blockchain operations. This may affect financial transactions, identity verification processes, or any sensitive data transmitted over the affected sessions. The impact is primarily confidentiality loss without direct effects on data integrity or system availability. Organizations relying on Consensys Discovery for critical infrastructure or regulatory compliance (e.g., GDPR) must consider the risk of data exposure and potential legal consequences. The absence of known exploits reduces immediate urgency but does not eliminate the threat, especially given the ease of remote exploitation without authentication. Failure to address this vulnerability could result in reputational damage and operational risks in the European blockchain ecosystem.
Mitigation Recommendations
1. Upgrade Consensys Discovery to version 0.4.5 or later immediately, as this version addresses the nonce reuse vulnerability. 2. If upgrading is temporarily not possible, implement network-level protections such as encrypted VPN tunnels or secure transport layers to reduce the risk of traffic interception. 3. Conduct a thorough audit of cryptographic implementations in all blockchain and peer-to-peer communication components to ensure nonce uniqueness and adherence to AES/GCM best practices. 4. Monitor network traffic for unusual patterns that could indicate attempts to exploit cryptographic weaknesses. 5. Educate development and security teams on the importance of nonce management in encryption schemes to prevent similar vulnerabilities. 6. Engage with Consensys support or community forums to track patch releases and vulnerability disclosures. 7. Implement strict key management policies to limit the lifespan and scope of session keys, reducing exposure windows. 8. Consider deploying intrusion detection systems capable of identifying anomalous decryption attempts or traffic analysis.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2024-01-19T17:35:09.985Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692a5c732a13ea799fd8c866
Added to database: 11/29/2025, 2:37:39 AM
Last enriched: 11/29/2025, 2:53:06 AM
Last updated: 12/4/2025, 7:34:22 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65806: n/a
UnknownCVE-2025-12097: CWE-23- Relative Path Traversal in NI LabVIEW
HighCVE-2025-55182 vulnerability in React and Next.js | Kaspersky official blog
MediumIndia Rolls Back Order to Preinstall Cybersecurity App on Smartphones
MediumCVE-2025-65945: CWE-347: Improper Verification of Cryptographic Signature in auth0 node-jws
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.