{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T05:50:41.308","vulnerabilities":[{"cve":{"id":"CVE-2024-23688","sourceIdentifier":"disclosure@vulncheck.com","published":"2024-01-19T22:15:08.563","lastModified":"2025-11-29T03:15:57.600","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed."},{"lang":"es","value":"Las versiones de Consensys Discovery inferiores a 0.4.5 utilizan el mismo nonce AES/GCM durante toda la sesión que idealmente debería ser único para cada mensaje. La clave privada del nodo no está comprometida, solo se expone la clave de sesión generada para una comunicación entre pares específica."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"disclosure@vulncheck.com","type":"Secondary","description":[{"lang":"en","value":"CWE-323"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-330"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:consensys:discovery:*:*:*:*:*:*:*:*","versionEndExcluding":"0.4.5","matchCriteriaId":"33F278C7-2BA2-400A-AB54-C1CC096B8D31"}]}]}],"references":[{"url":"https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83g","source":"disclosure@vulncheck.com","tags":["Vendor Advisory"]},{"url":"https://github.com/advisories/GHSA-w3hj-wr2q-x83g","source":"disclosure@vulncheck.com","tags":["Third Party Advisory"]},{"url":"https://vulncheck.com/advisories/vc-advisory-GHSA-w3hj-wr2q-x83g","source":"disclosure@vulncheck.com","tags":["Third Party Advisory"]},{"url":"https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83g","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://github.com/advisories/GHSA-w3hj-wr2q-x83g","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://vulncheck.com/advisories/vc-advisory-GHSA-w3hj-wr2q-x83g","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}