CWE-323

Reusing a Nonce, Key Pair in Encryption

8 CVEs Avg CVSS 7.3 MITRE
1
CRITICAL
4
HIGH
3
MEDIUM
0
LOW
1
POC
0
KEV

Monthly

CVE-2026-5446 MEDIUM This Month

wolfSSL's ARIA-GCM cipher suites in TLS 1.2 and DTLS 1.2 reuse an identical 12-byte nonce for every encrypted application-data record, enabling plaintext recovery through cryptanalytic attacks. This vulnerability affects only non-FIPS builds explicitly configured with --enable-aria and the proprietary MagicCrypto SDK (opt-in for Korean regulatory compliance). Authenticated remote attackers can exploit this to recover encrypted data, though AES-GCM implementations in the same product are unaffected due to independent invocation counters. No public exploit code or active exploitation has been identified at time of analysis.

Information Disclosure
NVD GitHub VulDB
CVSS 4.0
6.0
EPSS
0.0%
CVE-2026-3559 HIGH This Week

CVE-2026-3559 is an authentication bypass vulnerability in Philips Hue Bridge devices affecting the HomeKit Accessory Protocol implementation, where a static nonce in the SRP authentication mechanism allows network-adjacent attackers to gain unauthorized access without credentials. With a CVSS score of 8.1 and requiring only local network access, attackers can achieve high confidentiality and integrity impact on the affected smart home infrastructure. No active exploitation (not in KEV), POC availability, or EPSS data is currently available.

Authentication Bypass Hue Bridge
NVD
CVSS 3.0
8.1
EPSS
0.0%
CVE-2026-3099 MEDIUM This Month

Libsoup's digest authentication mechanism fails to validate nonce reuse and enforce proper nonce-count incrementation, enabling attackers to replay captured authentication headers to bypass access controls. A remote attacker can exploit this to impersonate legitimate users and access protected resources without valid credentials. No patch is currently available.

Authentication Bypass
NVD VulDB
CVSS 3.1
5.8
EPSS
0.1%
CVE-2026-25998 HIGH This Week

strongMan's credential encryption uses a static initialization vector with AES-CTR mode, causing all database fields to be encrypted with identical key streams. An attacker with database access can leverage publicly stored certificates to derive the key stream and decrypt stored private keys and EAP secrets. No patch is currently available for this high-severity vulnerability affecting strongSwan management deployments.

Information Disclosure Strongman
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-59870 HIGH This Week

HCL MyXalytics  is affected by improper management of a static JWT signing secret in the web application, where the secret lacks rotation , introducing a security risk [CVSS 7.4 HIGH]

Information Disclosure Myxalytics
NVD
CVSS 3.1
7.4
EPSS
0.0%
CVE-2025-47345 HIGH This Week

Cryptographic issue may occur while encrypting license data. [CVSS 8.4 HIGH]

Information Disclosure Qca6797aq Firmware Sa7255p Firmware Wsa8832 Firmware Sa9000p Firmware +101
NVD
CVSS 3.1
8.4
EPSS
0.0%
CVE-2025-64767 CRITICAL PATCH This Week

hpke-js is a Hybrid Public Key Encryption (HPKE) module built on top of Web Cryptography API. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2025-46632 MEDIUM POC This Month

Initialization vector (IV) reuse in the web management portal of the Tenda RX2 Pro 16.03.30.14 may allow an attacker to discern information about or more easily decrypt encrypted messages between. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Tenda Information Disclosure Rx2 Pro Firmware
NVD
CVSS 3.1
6.5
EPSS
0.3%
CVE-2026-5446
EPSS 0% CVSS 6.0
MEDIUM This Month

wolfSSL's ARIA-GCM cipher suites in TLS 1.2 and DTLS 1.2 reuse an identical 12-byte nonce for every encrypted application-data record, enabling plaintext recovery through cryptanalytic attacks. This vulnerability affects only non-FIPS builds explicitly configured with --enable-aria and the proprietary MagicCrypto SDK (opt-in for Korean regulatory compliance). Authenticated remote attackers can exploit this to recover encrypted data, though AES-GCM implementations in the same product are unaffected due to independent invocation counters. No public exploit code or active exploitation has been identified at time of analysis.

Information Disclosure
NVD GitHub VulDB
CVE-2026-3559
EPSS 0% CVSS 8.1
HIGH This Week

CVE-2026-3559 is an authentication bypass vulnerability in Philips Hue Bridge devices affecting the HomeKit Accessory Protocol implementation, where a static nonce in the SRP authentication mechanism allows network-adjacent attackers to gain unauthorized access without credentials. With a CVSS score of 8.1 and requiring only local network access, attackers can achieve high confidentiality and integrity impact on the affected smart home infrastructure. No active exploitation (not in KEV), POC availability, or EPSS data is currently available.

Authentication Bypass Hue Bridge
NVD
CVE-2026-3099
EPSS 0% CVSS 5.8
MEDIUM This Month

Libsoup's digest authentication mechanism fails to validate nonce reuse and enforce proper nonce-count incrementation, enabling attackers to replay captured authentication headers to bypass access controls. A remote attacker can exploit this to impersonate legitimate users and access protected resources without valid credentials. No patch is currently available.

Authentication Bypass
NVD VulDB
CVE-2026-25998
EPSS 0% CVSS 7.5
HIGH This Week

strongMan's credential encryption uses a static initialization vector with AES-CTR mode, causing all database fields to be encrypted with identical key streams. An attacker with database access can leverage publicly stored certificates to derive the key stream and decrypt stored private keys and EAP secrets. No patch is currently available for this high-severity vulnerability affecting strongSwan management deployments.

Information Disclosure Strongman
NVD GitHub
CVE-2025-59870
EPSS 0% CVSS 7.4
HIGH This Week

HCL MyXalytics  is affected by improper management of a static JWT signing secret in the web application, where the secret lacks rotation , introducing a security risk [CVSS 7.4 HIGH]

Information Disclosure Myxalytics
NVD
CVE-2025-47345
EPSS 0% CVSS 8.4
HIGH This Week

Cryptographic issue may occur while encrypting license data. [CVSS 8.4 HIGH]

Information Disclosure Qca6797aq Firmware Sa7255p Firmware +103
NVD
CVE-2025-64767
EPSS 0% CVSS 9.1
CRITICAL PATCH This Week

hpke-js is a Hybrid Public Key Encryption (HPKE) module built on top of Web Cryptography API. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure
NVD GitHub
CVE-2025-46632
EPSS 0% CVSS 6.5
MEDIUM POC This Month

Initialization vector (IV) reuse in the web management portal of the Tenda RX2 Pro 16.03.30.14 may allow an attacker to discern information about or more easily decrypt encrypted messages between. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Tenda Information Disclosure Rx2 Pro Firmware
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy