In RNP version 0.18.0 a refactoring regression causes the...
High severity
Unreviewed
Published
Nov 21, 2025
to the GitHub Advisory Database
•
Updated Nov 21, 2025
Description
Published by the National Vulnerability Database
Nov 21, 2025
Published to the GitHub Advisory Database
Nov 21, 2025
Last updated
Nov 21, 2025
In RNP version 0.18.0 a refactoring regression causes the symmetric
session key used for Public-Key Encrypted Session Key (PKESK) packets to
be left uninitialized except for zeroing, resulting in it always being
an all-zero byte array.
Any data encrypted using public-key encryption
in this release can be decrypted trivially by supplying an all-zero
session key, fully compromising confidentiality.
The vulnerability affects only public key encryption (PKESK packets). Passphrase-based encryption (SKESK packets) is not affected.
Root cause: Vulnerable session key buffer used in PKESK packet generation.
The defect was introduced in commit
7bd9a8dc356aae756b40755be76d36205b6b161awhere initializationlogic inside
encrypted_build_skesk()only randomized the key for theSKESK path and omitted it for the PKESK path.
References