CVE-2022-32096

7.5 HIGH

📋 TL;DR

CVE-2022-32096 is a buffer overflow vulnerability in Rhonabwy's JWE decryption component that allows attackers to cause Denial of Service (DoS) by sending specially crafted JWE tokens. This affects systems using Rhonabwy library versions before 1.1.5 for JWE token processing.

💻 Affected Systems

Products:
  • Rhonabwy JWE/JWT library
Versions: All versions before 1.1.5
Operating Systems: All platforms running Rhonabwy
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using r_jwe_aesgcm_key_unwrap function is vulnerable when processing JWE tokens.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption through DoS, potentially leading to system crashes or resource exhaustion.

🟠

Likely Case

Service disruption through DoS attacks, requiring restart of affected services.

🟢

If Mitigated

Limited impact with proper input validation and monitoring in place.

🌐 Internet-Facing: HIGH - JWE tokens are commonly processed by internet-facing APIs and authentication endpoints.
🏢 Internal Only: MEDIUM - Internal services using Rhonabwy for JWE processing could be disrupted by internal attackers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted JWE tokens to vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.5 and later

Vendor Advisory: https://github.com/babelouest/rhonabwy/commit/b4c2923a1ba4fabf9b55a89244127e153a3e549b

Restart Required: Yes

Instructions:

1. Update Rhonabwy to version 1.1.5 or later. 2. Rebuild and redeploy applications using the library. 3. Restart affected services.

🔧 Temporary Workarounds

Input validation and filtering

all

Implement strict input validation for JWE tokens before passing to Rhonabwy functions.

Rate limiting

all

Implement rate limiting on JWE token processing endpoints to limit DoS impact.

🧯 If You Can't Patch

  • Implement WAF rules to block suspicious JWE tokens
  • Isolate vulnerable services behind reverse proxies with request filtering

🔍 How to Verify

Check if Vulnerable:

Check Rhonabwy library version in your application dependencies. If version < 1.1.5, you are vulnerable.

Check Version:

Check package manager (npm, pip, etc.) or build configuration for Rhonabwy version

Verify Fix Applied:

Verify Rhonabwy version is 1.1.5 or later after update and test JWE token processing functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or abnormal exits during JWE processing
  • High error rates from JWE decryption functions
  • Unusual memory usage patterns

Network Indicators:

  • Multiple failed JWE token submissions
  • Unusually large JWE tokens
  • Spike in requests to JWE endpoints

SIEM Query:

source="application_logs" AND ("r_jwe_aesgcm_key_unwrap" OR "JWE decryption error") AND severity=ERROR

🔗 References

📤 Share & Export