CVE-2025-13353
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-15
Assigner: Cloudflare, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cloudflare | gokey | to 0.2.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-330 | The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in gokey versions prior to 0.2.0 is due to a flaw in the seed decryption logic where passwords were incorrectly derived only from the initial vector and the AES-GCM authentication tag of the key seed, rather than using the full seed entropy. This caused keys and secrets generated from a seed file to have significantly lower entropy (only 28 bytes used instead of the expected 240 bytes), making them weaker and potentially recoverable by an attacker who has the seed file without needing the master password.
How can this vulnerability impact me? :
The vulnerability can impact you by producing keys and secrets with lower entropy when generated from a seed file, making them easier to recover by a malicious entity who possesses the seed file. This compromises the security of passwords and secrets generated using the seed file (-s option). However, keys/secrets generated solely from the master password (without the seed file) are not affected. Users must regenerate and rotate their secrets using gokey version 0.2.0 or above to ensure security.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by identifying if gokey versions prior to 0.2.0 are used to generate keys/secrets from a seed file (using the -s option). There are no specific network detection commands provided. To check the gokey version installed, you can run the command: `gokey --version`. If the version is less than 0.2.0 and the -s option was used for key generation, the system is vulnerable.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading gokey to version 0.2.0 or above, regenerating all passwords/secrets using the patched version, and rotating these secrets in the respective systems. Depending on the system's password rotation capabilities, users should either use the 'Forgot password' facility, use the old password recovery method with gokey version 0.1.3 if required, or provision multiple credentials and revoke old ones as appropriate.