CVE ReportsThe Verification Theater: Breaking hpke-rs Vulnerability ID: GHSA-G433-PQ76-6CMF CVSS...
Vulnerability ID: GHSA-G433-PQ76-6CMF
CVSS Score: 9.8
Published: 2026-02-13
A collection of critical cryptographic failures in the hpke-rs library, ranging from RFC non-compliance (missing all-zero checks) to catastrophic nonce reuse via integer overflow. Despite being marketed as a high-assurance, formally verified library, it failed to implement basic safety checks required by RFC 9180.
The hpke-rs library, used for Hybrid Public Key Encryption, contained multiple critical flaws: it failed to validate X25519 shared secrets (allowing key compromise), used a 32-bit counter for nonces (leading to wrap-around and nonce reuse), and truncated KDF inputs. These issues allow for complete session compromise and plaintext recovery.
0.6.0)Added check for X25519 all-zero shared secret
+ if is_zero == 1 { return Err(HpkeError::InvalidKey); }
Updated sequence number to u64 and added checked_add
- seq: u32
+ seq: u64
+ self.seq.checked_add(1)
Remediation Steps:
hpke-rs crate to version >= 0.6.0 in Cargo.toml.cargo update to pull the new version.cargo tree to ensure no other crate is pulling in an older version of hpke-rs.cargo audit to confirm the vulnerability report is cleared.Read the full report for GHSA-G433-PQ76-6CMF on our website for more details including interactive diagrams and full exploit analysis.