-
Type: Improvement
-
Status: Resolved
-
Priority: Major
-
Resolution: Fixed
-
Affects Version/s: None
-
Fix Version/s: 10.3
-
Component/s: BlobManager
-
Impact type:Data Persistence Change
-
Upgrade notes:
-
Sprint:nxFG 10.3.3
-
Story Points:2
AESBinaryManager currently uses AES/CBC/PKCS5Padding which has been discovered to be susceptible to padding oracle attacks (https://find-sec-bugs.github.io/bugs.htm#PADDING_ORACLE, https://en.wikipedia.org/wiki/Padding_oracle_attack#Padding_oracle_attack_on_CBC_encryption).
It should be replaced by the more secure AES/GCM/NoPadding.
NOTE that this means that previously-encrypted data will not be readable anymore. Compatibility is provided to keep using the old insecure encryption mode (see upgrade notes).
- depends on
-
NXP-15106 AES Binary Store Encryption
- Resolved