CVE-2025-64429
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-25
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| duckdb | duckdb | From 1.4.0 (inc) to 1.4.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-327 | The product uses a broken or risky cryptographic algorithm or protocol. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves DuckDB's block-based encryption implementation starting from version 1.4.0. DuckDB could fall back to an insecure random number generator (pcg32) for generating cryptographic keys or IVs, which is weak. The compiler might remove memory clearing calls (memset), leaving sensitive keys in memory. Attackers could downgrade encryption from GCM to CTR mode by modifying the database header, bypassing integrity checks. There may also be failures to check OpenSSL's rand_bytes() return values, allowing attackers to compromise the RNG state, recover encryption keys from memory leaks, and circumvent integrity protections. Version 1.4.2 addresses these issues by disabling the insecure RNG fallback, using secure memory clearing, requiring explicit cipher specification, and checking return codes.
How can this vulnerability impact me? :
This vulnerability can allow attackers to recover cryptographic keys used to encrypt database files, bypass integrity checks, and potentially access or manipulate sensitive data stored in DuckDB databases. If an attacker can access process memory or modify database headers, they could decrypt or tamper with data that should be protected, leading to data breaches or data integrity violations.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade DuckDB to version 1.4.2 or later, as this version disables the insecure random number generator fallback, uses secure MbedTLS primitives to clear memory, requires explicit specification of ciphers without integrity checks like CTR on ATTACH, and checks return codes properly. Additionally, ensure that the OpenSSL implementation is installed and loaded in the httpfs extension as DuckDB now attempts to do.