CVE-2023-2975
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/07/2023
Last modified:
23/04/2025
Description
Issue summary: The AES-SIV cipher implementation contains a bug that causes<br />
it to ignore empty associated data entries which are unauthenticated as<br />
a consequence.<br />
<br />
Impact summary: Applications that use the AES-SIV algorithm and want to<br />
authenticate empty data entries as associated data can be misled by removing,<br />
adding or reordering such empty entries as these are ignored by the OpenSSL<br />
implementation. We are currently unaware of any such applications.<br />
<br />
The AES-SIV algorithm allows for authentication of multiple associated<br />
data entries along with the encryption. To authenticate empty data the<br />
application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with<br />
NULL pointer as the output buffer and 0 as the input buffer length.<br />
The AES-SIV implementation in OpenSSL just returns success for such a call<br />
instead of performing the associated data authentication operation.<br />
The empty data thus will not be authenticated.<br />
<br />
As this issue does not affect non-empty associated data authentication and<br />
we expect it to be rare for an application to use empty associated data<br />
entries this is qualified as Low severity issue.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.0.0 (including) | 3.0.9 (including) |
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.1.0 (including) | 3.1.1 (including) |
| cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc
- https://www.openssl.org/news/secadv/20230714.txt
- http://www.openwall.com/lists/oss-security/2023/07/15/1
- http://www.openwall.com/lists/oss-security/2023/07/19/5
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc
- https://security.gentoo.org/glsa/202402-08
- https://security.netapp.com/advisory/ntap-20230725-0004/
- https://www.openssl.org/news/secadv/20230714.txt



