The Sound of Silence: Breaking Clatter's Post-Quantum Promises (CVE-2026-24785)
Vulnerability ID: CVE-2026-24785
CVSS Score: 8.0
Published: 2026-01-28
A critical protocol compliance failure in the Clatter Rust library allows attackers to decrypt Post-Quantum Noise sessions. By violating the Noise Protocol's PSK Validity Rule, specific handshake patterns fail to mix ephemeral entropy before encryption, leading to catastrophic key reuse.
TL;DR
Clatter < 2.2.0 implemented 'psk0' handshake patterns incorrectly. It used static Pre-Shared Keys to encrypt data before establishing ephemeral randomness. This turns a fancy Post-Quantum encryption tunnel into a static substitution cipher, allowing anyone with the PSK (or a reused stream) to decrypt the entire session.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-327
- Attack Vector: Network
- CVSS Score: 8.0 (High)
- Impact: Confidentiality & Integrity Loss
- EPSS Score: 0.00015
- Vulnerability Type: Cryptographic Logic Error
Affected Systems
- Rust applications using Clatter < 2.2.0
- Embedded systems using Clatter with
psk0patterns - Post-Quantum VPN implementations using Clatter
-
Clatter: < 2.2.0 (Fixed in:
2.2.0)
Code Analysis
Commit: b65ae6e
Implementation of PSK validity rule and removal of non-compliant patterns
+ fn validate_psk_rule(...) -> Result<(), PatternError> {
+ // check if psk sent but no ephemeral key before encryption
+ }
Exploit Details
- Hypothetical: Exploitation involves capturing handshake packets and deriving keys using known PSK.
Mitigation Strategies
- Upgrade Clatter to version 2.2.0 or later immediately.
- Audit all usage of Noise Handshake Patterns in your codebase.
- Discontinue use of
psk0variants (noise_pqkk_psk0, etc.). - Implement application-level checks to ensure ephemeral keys (
e,ekem) are exchanged before sensitive data is sent.
Remediation Steps:
- Check
Cargo.tomlforclatterversion. - Run
cargo update -p clatterto pull v2.2.0. - If using custom patterns, verify against Noise Section 9.3.
- Re-compile and redeploy affected services.
References
Read the full report for CVE-2026-24785 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)