Lucene search

K
redhatcveRedhat.comRH:CVE-2023-51775
HistoryFeb 29, 2024 - 9:03 a.m.

CVE-2023-51775

2024-02-2909:03:19
redhat.com
access.redhat.com
13
cve-2023-51775
java
cpu consumption
pbes2 count

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%

A flaw was found in the jose.4.j (jose4j) library. The JWE key management algorithms based on PBKDF2 require a JOSE Header Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2 iterations needed to derive a CEK wrapping key. Its primary purpose is to intentionally slow down the key derivation function, making password brute-force and dictionary attacks more resource-intensive. However, if an attacker sets the p2c parameter in JWE to a large number, it can cause high computational consumption, resulting in a denial of service.

Mitigation

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%