CVE-2021-46873

WireGuard, such as WireGuard 0.5.3 on Windows, does not fully account for the possibility that an adversary might be able to set a victim's system time to a future value, e.g., because unauthenticated NTP is used. This can lead to an outcome in which one static private key becomes permanently useless.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:wireguard:wireguard:0.5.3:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

28 Mar 2025, 16:15

Type Values Removed Values Added
CWE CWE-362

21 Nov 2024, 06:34

Type Values Removed Values Added
Summary
  • (es) WireGuard, como WireGuard 0.5.3 en Windows, no tiene en cuenta completamente la posibilidad de que un adversario pueda establecer la hora del sistema de una víctima en un valor futuro, por ejemplo, porque se utiliza NTP no autenticado. Esto puede llevar a un resultado en el que una clave privada estática se vuelva permanentemente inútil.
References () https://lists.zx2c4.com/pipermail/wireguard/2021-August/006916.html - Mailing List, Third Party Advisory () https://lists.zx2c4.com/pipermail/wireguard/2021-August/006916.html - Mailing List, Third Party Advisory

Information

Published : 2023-01-29 23:15

Updated : 2025-03-28 16:15


NVD link : CVE-2021-46873

Mitre link : CVE-2021-46873

CVE.ORG link : CVE-2021-46873


JSON object : View

Products Affected

microsoft

  • windows

wireguard

  • wireguard
CWE
NVD-CWE-noinfo CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')