CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
AI Score
Confidence
High
EPSS
Percentile
15.5%
Denial of Service,
Applications that allow the use of the PBKDF2 algorithm.
A patch is available that sets the maximum number of default rounds.
Applications that do not need to use PBKDF2 should simply specify the algorithms use and exclude it from the list.
Applications that need to use the algorithm should upgrade to the new version that allows to set a maximum rounds number.
The issues was reported by Jingcheng Yang and Jianjun Chen from Sichuan University
and Zhongguancun Lab
Vendor | Product | Version | CPE |
---|---|---|---|
jwcrypto_project | jwcrypto | * | cpe:2.3:a:jwcrypto_project:jwcrypto:*:*:*:*:*:*:*:* |
access.redhat.com/errata/RHSA-2024:3267
access.redhat.com/security/cve/CVE-2023-6681
bugzilla.redhat.com/show_bug.cgi?id=2260843
github.com/advisories/GHSA-cw2r-4p82-qv79
github.com/latchset/jwcrypto/commit/d2655d370586cb830e49acfb450f87598da60be8
github.com/latchset/jwcrypto/security/advisories/GHSA-cw2r-4p82-qv79
nvd.nist.gov/vuln/detail/CVE-2023-6681