This vulnerability occurs when software uses a predictable or reused Initialization Vector (IV) with Cipher Block Chaining (CBC) mode encryption. Predictable IVs undermine the security of CBC, making encrypted data vulnerable to dictionary and chosen-plaintext attacks, especially when the same key is used multiple times.
CBC mode improves upon basic ECB encryption by ensuring identical plaintext blocks encrypt to different ciphertext blocks. It achieves this by XOR-ing the first plaintext block with a unique, random Initialization Vector (IV) before encryption, and then chaining each subsequent block with the previous ciphertext. This process breaks patterns in the plaintext. However, if the IV is predictable or reused, this core security mechanism fails. When an attacker can guess or calculate the IV, they can launch practical attacks. Even if IVs aren't identical, predictable sequences allow attackers to perform chosen-plaintext attacks (CPA), where they analyze differences between known inputs and resulting ciphertexts to deduce the encryption key or decrypt data. Always generate IVs using a cryptographically secure random number generator for each encryption operation to maintain CBC's security guarantees.
Impact: Read Application Data
If the IV is not properly initialized, data that is encrypted can be compromised and leak information.
cjavaMedium