{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T13:08:51.680","vulnerabilities":[{"cve":{"id":"CVE-2023-46129","sourceIdentifier":"security-advisories@github.com","published":"2023-10-31T00:15:09.933","lastModified":"2026-03-30T14:30:00.877","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library's `xkeys` encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing.  \nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep."},{"lang":"es","value":"NATS.io es una tecnología de comunicación distribuida pub-sub de código abierto de alto rendimiento, creada para la nube, local, IoT y computación de borde. La librería de manejo de claves criptográficas, nkeys, recientemente obtuvo soporte para cifrado, no solo para firma/autenticación. Esto se utiliza en nats-server 2.10 (septiembre de 2023) y versiones posteriores para llamadas de autenticación. En las versiones 0.4.0 a 0.4.5 de nkeys, correspondientes a las versiones 2.10.0 a 2.10.3 del servidor NATS, la lógica de manejo de cifrado `xkeys` de la librería nkeys pasó por error una matriz por valor a una función interna, donde la función mutó ese búfer. para completar la clave de cifrado que se utilizará. Como resultado, todo el cifrado se realizó en realidad con una clave de todos ceros. Esto afecta únicamente al cifrado, no a la firma. SOLUCIÓN: COMPLETE EL IMPACTO EN LA SEGURIDAD DE LA LLAMADA DE AUTENCIÓN DEL SERVIDOR NATS. La librería nkeys Go 0.4.6, correspondiente a NATS Server 2.10.4, tiene un parche para este problema. No hay workarounds conocidos disponibles. Para cualquier aplicación que maneje llamadas de autenticación en Go, si usa la librería nkeys, actualice la dependencia, vuelva a compilarla e implementarla al mismo tiempo."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-321"},{"lang":"en","value":"CWE-325"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:linuxfoundation:nats-server:*:*:*:*:*:*:*:*","versionStartIncluding":"2.10.0","versionEndExcluding":"2.10.4","matchCriteriaId":"C0BA4B5C-ED39-4C3E-8D5C-B81754139B87"},{"vulnerable":true,"criteria":"cpe:2.3:a:nats:nkeys:*:*:*:*:*:*:*:*","versionStartIncluding":"0.4.0","versionEndExcluding":"0.4.6","matchCriteriaId":"EBAF8F73-D62A-4371-916F-0296A4B975B5"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2023/10/31/1","source":"security-advisories@github.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/","source":"security-advisories@github.com"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/","source":"security-advisories@github.com"},{"url":"http://www.openwall.com/lists/oss-security/2023/10/31/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}