Duplicate Advisory: Discovery uses the same AES/GCM Nonce throughout the session
Moderate severity
GitHub Reviewed
Published
Jan 20, 2024
to the GitHub Advisory Database
•
Updated Dec 2, 2025
Withdrawn
This advisory was withdrawn on Dec 2, 2025
Description
Published by the National Vulnerability Database
Jan 19, 2024
Published to the GitHub Advisory Database
Jan 20, 2024
Reviewed
Dec 2, 2025
Withdrawn
Dec 2, 2025
Last updated
Dec 2, 2025
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-w3hj-wr2q-x83g. This link is maintained to preserve external references.
Original Description
Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed.
References