EUVD-2025-16794

| CVE-2025-24015 MEDIUM
5.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None

Lifecycle Timeline

5
EUVD ID Assigned
Mar 14, 2026 - 17:04 euvd
EUVD-2025-16794
Analysis Generated
Mar 14, 2026 - 17:04 vuln.today
Patch Released
Mar 14, 2026 - 17:04 nvd
Patch available
PoC Detected
Jun 09, 2025 - 15:11 vuln.today
Public exploit code
CVE Published
Jun 03, 2025 - 23:15 nvd
MEDIUM 5.3

Description

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions 1.46.0 through 2.1.6 have an issue that affects AES-256-GCM and AES-128-GCM in Deno in which the authentication tag is not being validated. This means tampered ciphertexts or incorrect keys might not be detected, which breaks the guarantees expected from AES-GCM. Older versions of Deno correctly threw errors in such cases, as does Node.js. Without authentication tag verification, AES-GCM degrades to essentially CTR mode, removing integrity protection. Authenticated data set with set_aad is also affected, as it is incorporated into the GCM hash (ghash) but this too is not validated, rendering AAD checks ineffective. Version 2.1.7 includes a patch that addresses this issue.

Analysis

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions 1.46.0 through 2.1.6 have an issue that affects AES-256-GCM and AES-128-GCM in Deno in which the authentication tag is not being validated. This means tampered ciphertexts or incorrect keys might not be detected, which breaks the guarantees expected from AES-GCM. Older versions of Deno correctly threw errors in such cases, as does Node.js. Without authentication tag verification, AES-GCM degrades to essentially CTR mode, removing integrity protection. Authenticated data set with set_aad is also affected, as it is incorporated into the GCM hash (ghash) but this too is not validated, rendering AAD checks ineffective. Version 2.1.7 includes a patch that addresses this issue.

Technical Context

This vulnerability is classified as Improper Verification of Cryptographic Signature (CWE-347).

Affected Products

Affected products: Deno Deno

Remediation

A vendor patch is available. Apply it as soon as possible and verify the fix.

Priority Score

47
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +26
POC: +20

Vendor Status

Share

EUVD-2025-16794 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy