Bramble Handshake Protocol (BHP) in Briar before 1.5.3 is not forward secure: eavesdroppers can decrypt network traffic between two accounts if they later compromise both accounts. NOTE: the eavesdropping is typically impractical because BHP runs over an encrypted session that uses the Tor hidden service protocol.
References
Link | Resource |
---|---|
https://briarproject.org/news/2023-three-security-issues-found-and-fixed/ | Vendor Advisory |
https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_YuanmingSong.pdf | Exploit Technical Description Third Party Advisory |
https://briarproject.org/news/2023-three-security-issues-found-and-fixed/ | Vendor Advisory |
https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_YuanmingSong.pdf | Exploit Technical Description Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-05-24 18:15
Updated : 2025-01-16 16:15
NVD link : CVE-2023-33982
Mitre link : CVE-2023-33982
CVE.ORG link : CVE-2023-33982
JSON object : View
Products Affected
briarproject
- briar
CWE
CWE-326
Inadequate Encryption Strength