Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24785: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in jmlepisto clatter

0
High
VulnerabilityCVE-2026-24785cvecve-2026-24785cwe-327
Published: Tue Jan 27 2026 (01/27/2026, 23:38:53 UTC)
Source: CVE Database V5
Vendor/Project: jmlepisto
Product: clatter

Description

CVE-2026-24785 is a high-severity vulnerability in the jmlepisto clatter Rust library, a no_std compatible implementation of the Noise protocol framework with post-quantum support. Versions prior to 2. 2. 0 allow post-quantum handshake patterns that violate the PSK validity rule, enabling PSK-derived keys to be used without proper ephemeral randomness. This flaw weakens cryptographic guarantees and risks catastrophic key reuse, compromising confidentiality and integrity of communications. The vulnerability affects default patterns such as noise_pqkk_psk0 and related variants. The issue is patched in clatter v2. 2. 0, which adds runtime checks to prevent misuse. European organizations using affected versions or relying on these handshake patterns should upgrade promptly or avoid the vulnerable patterns.

AI-Powered Analysis

AILast updated: 01/28/2026, 00:05:24 UTC

Technical Analysis

The vulnerability identified as CVE-2026-24785 concerns the jmlepisto clatter library, a Rust implementation of the Noise protocol framework designed for no_std environments and supporting post-quantum cryptography. Prior to version 2.2.0, clatter allowed the use of post-quantum handshake patterns that violated the pre-shared key (PSK) validity rule defined in Section 9.3 of the Noise Protocol Framework specification. Specifically, the affected patterns (e.g., noise_pqkk_psk0, noise_pqkn_psk0, noise_pqnk_psk0, noise_pqnn_psk0, and some hybrid variants) permitted PSK-derived keys to be used for encryption without the necessary randomization through self-chosen ephemeral randomness. This omission undermines the security guarantees of the handshake by enabling potential catastrophic key reuse, which can lead to the compromise of confidentiality and integrity of the encrypted communication channel. The flaw is rooted in the use of a broken or risky cryptographic algorithm approach (CWE-327), where the cryptographic protocol does not enforce proper randomness in key derivation. The vulnerability has a CVSS 4.0 base score of 8.0, indicating high severity, with network attack vector, no required privileges or user interaction, and high impact on confidentiality and integrity. The issue has been fully addressed in clatter version 2.2.0, which introduces runtime checks to detect and prevent the use of offending handshake patterns. Users are advised to upgrade to this version or avoid using the vulnerable *_psk0 post-quantum handshake variants. Custom handshake patterns should be carefully reviewed to ensure compliance with the PSK validity rule and proper ephemeral randomness usage.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on the clatter library for secure communications in embedded or constrained environments where no_std Rust libraries are preferred. The weakened cryptographic guarantees can lead to exposure of sensitive data, interception, or manipulation of communications, undermining confidentiality and integrity. This is particularly critical for sectors handling sensitive personal data under GDPR, such as finance, healthcare, and government services. The potential for catastrophic key reuse increases the risk of long-term compromise of encrypted sessions, which could facilitate espionage, data breaches, or disruption of critical services. Organizations using affected versions of clatter in IoT devices, secure messaging, or post-quantum cryptographic applications may face increased risk of targeted attacks. Although no exploits are currently known in the wild, the high CVSS score and nature of the vulnerability warrant proactive mitigation to prevent future exploitation.

Mitigation Recommendations

European organizations should immediately upgrade any deployments of the jmlepisto clatter library to version 2.2.0 or later, which contains the necessary runtime checks and fixes. If upgrading is not immediately feasible, avoid using any post-quantum handshake patterns with the *_psk0 suffix, as these are known to violate the PSK validity rule. Conduct a thorough audit of all custom handshake patterns to ensure they comply with the Noise Protocol Framework's PSK validity requirements and enforce proper ephemeral randomness. Implement monitoring to detect anomalous cryptographic behavior or unexpected key reuse patterns. For embedded and constrained environments, validate that cryptographic libraries are up to date and that secure coding practices are followed to prevent misuse of cryptographic primitives. Engage with vendors and suppliers to confirm that their products using clatter have applied the patch. Finally, consider incorporating cryptographic protocol fuzzing and formal verification tools to detect similar protocol compliance issues in future development.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-26T21:06:47.870Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69794f604623b1157c50222d

Added to database: 1/27/2026, 11:50:56 PM

Last enriched: 1/28/2026, 12:05:24 AM

Last updated: 1/28/2026, 1:29:13 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats