Consensys Discovery Nonce Reuse
Description
Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Consensys Discovery prior to 0.4.5 reuses the same AES/GCM nonce for the entire session, exposing the session key used for peer communication.
Vulnerability
Description
Consensys Discovery versions before 0.4.5 implement AES/GCM encryption for peer-to-peer communication. According to cryptographic standards, the nonce used in AES/GCM must be unique for each encrypted message. However, the library reuses the same nonce throughout the entire session, violating this requirement [1][3]. This flaw allows an attacker who observes multiple encrypted messages to recover the session key.
Exploitation
The attack is purely passive and requires no authentication or special network position. An attacker simply needs to intercept network traffic between two peers using Discovery. By capturing multiple ciphertexts encrypted with the same nonce and key, the attacker can compute the session key [3][4]. The session key is derived from the peer communication and is distinct from the node's private key.
Impact
With the compromised session key, the attacker can decrypt all messages within that session and forge new encrypted messages, potentially impersonating one peer or injecting malicious data. However, the node's long-term private key remains secure, so the ENR (Ethereum Node Record) cannot be altered [1][3]. The exposure is limited to the specific peer session, but it undermines the confidentiality and integrity of communications.
Mitigation
The issue has been addressed in Consensys Discovery version 0.4.5 [2][4]. Users are strongly advised to upgrade to this or later versions. No workaround is available; the fix ensures each message uses a unique nonce as per the Discovery v5 specification [3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
tech.pegasys.discovery:discoveryMaven | < 0.4.5 | 0.4.5 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83gghsavendor-advisoryWEB
- github.com/advisories/GHSA-w3hj-wr2q-x83gghsathird-party-advisoryADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-23688ghsaADVISORY
- vulncheck.com/advisories/vc-advisory-GHSA-w3hj-wr2q-x83gghsathird-party-advisoryWEB
News mentions
0No linked articles in our index yet.