Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13470: CWE-330 Use of Insufficiently Random Values in Ribose RNP

0
High
VulnerabilityCVE-2025-13470cvecve-2025-13470cwe-330
Published: Fri Nov 21 2025 (11/21/2025, 17:05:15 UTC)
Source: CVE Database V5
Vendor/Project: Ribose
Product: RNP

Description

In RNP version 0.18.0 a refactoring regression causes the symmetric session key used for Public-Key Encrypted Session Key (PKESK) packets to be left uninitialized except for zeroing, resulting in it always being an all-zero byte array. Any data encrypted using public-key encryption in this release can be decrypted trivially by supplying an all-zero session key, fully compromising confidentiality. The vulnerability affects only public key encryption (PKESK packets).  Passphrase-based encryption (SKESK packets) is not affected. Root cause: Vulnerable session key buffer used in PKESK packet generation. The defect was introduced in commit `7bd9a8dc356aae756b40755be76d36205b6b161a` where initialization logic inside `encrypted_build_skesk()` only randomized the key for the SKESK path and omitted it for the PKESK path.

AI-Powered Analysis

AILast updated: 11/21/2025, 17:24:19 UTC

Technical Analysis

CVE-2025-13470 is a cryptographic vulnerability identified in Ribose RNP version 0.18.0, a widely used OpenPGP implementation. The issue stems from a refactoring regression introduced in commit 7bd9a8dc356aae756b40755be76d36205b6b161a, where the symmetric session key buffer used for Public-Key Encrypted Session Key (PKESK) packets was left uninitialized except for zeroing. Specifically, the initialization logic that randomized the session key was applied only to the passphrase-based encryption path (SKESK) but omitted for the PKESK path. As a result, the session key used in PKESK packets is always an all-zero byte array. This critical flaw allows any data encrypted using public-key encryption in RNP 0.18.0 to be decrypted trivially by an attacker who supplies the all-zero session key, completely breaking the confidentiality guarantees of the encryption. The vulnerability does not affect passphrase-based encryption (SKESK packets), limiting the scope to public-key encrypted data. The CVSS 4.0 score is 7.7 (high severity), reflecting the network attack vector, no required privileges or user interaction, and a high impact on confidentiality. No known exploits have been reported in the wild yet, but the vulnerability is straightforward to exploit given the static session key. This defect compromises the fundamental security of encrypted communications relying on RNP 0.18.0's public-key encryption, potentially exposing sensitive data to unauthorized parties.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive communications and data protected using Ribose RNP 0.18.0 public-key encryption. Sectors such as government agencies, financial institutions, healthcare providers, and critical infrastructure operators that rely on OpenPGP encryption for secure email, document exchange, or key management could face data breaches if attackers exploit this flaw. The trivial decryptability of encrypted data means that intercepted communications or stored encrypted files can be compromised without complex cryptanalysis. This undermines trust in encrypted communications and may lead to regulatory non-compliance under GDPR and other data protection laws, resulting in legal and financial repercussions. Additionally, espionage or cybercrime groups could leverage this vulnerability to gain access to confidential information. The lack of required authentication or user interaction increases the attack surface, making remote exploitation feasible. Although no exploits are currently known in the wild, the vulnerability’s simplicity and severity necessitate urgent attention to prevent potential incidents.

Mitigation Recommendations

European organizations should immediately audit their use of Ribose RNP to identify deployments of version 0.18.0. Until a patched version is released, they should avoid using RNP 0.18.0 for public-key encryption tasks and revert to a previous secure version or alternative OpenPGP implementations. If public-key encryption is essential, switching to passphrase-based encryption (SKESK packets) temporarily can mitigate exposure since it is unaffected. Organizations should monitor Ribose’s official channels for patches and apply updates promptly once available. Additionally, they should implement network-level controls to detect and block suspicious traffic that may attempt to exploit this vulnerability. Encrypting sensitive data with multiple layers or alternative cryptographic tools can provide defense in depth. Regularly reviewing cryptographic libraries and enforcing strict version control policies will help prevent similar regressions. Finally, organizations should conduct security awareness training to highlight the importance of timely patching and cryptographic hygiene.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Ribose
Date Reserved
2025-11-20T08:36:59.270Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6920a035e2e82c338511ca88

Added to database: 11/21/2025, 5:24:05 PM

Last enriched: 11/21/2025, 5:24:19 PM

Last updated: 11/21/2025, 6:24:23 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats