Trust But Verify? Nah. Breaking rPGP's Integrity Checks
Vulnerability ID: GHSA-C7PH-F7JM-XV4W
CVSS Score: 6.5
Published: 2026-02-13
A critical logic flaw in the rPGP OpenPGP implementation allowed attackers to bypass message integrity checks. By failing to strictly verify the Modification Detection Code (MDC) in encrypted packets, the library exposed applications like Delta Chat to ciphertext manipulation and 'In-Band Signaling' attacks. This vulnerability highlights the dangers of legacy OpenPGP complexity even in modern, memory-safe languages like Rust.
TL;DR
rPGP failed to consistently verify the cryptographic integrity (MDC) of encrypted messages. This allowed Man-in-the-Middle attackers to modify ciphertext without detection, leading to potential data exfiltration via 'In-Band Signaling' attacks in downstream applications like Delta Chat.
⚠️ Exploit Status: POC
Technical Details
- CWE: CWE-347 (Improper Verification of Cryptographic Signature)
- Attack Vector: Network (Man-in-the-Middle)
- CVSS v3.1: 6.5 (Medium)
- Impact: Integrity Loss / Data Exfiltration
- Affected Protocol: OpenPGP (SEIP / Tag 18)
- Fix Version: 0.11.0
Affected Systems
- rPGP (Rust OpenPGP implementation)
- Delta Chat (Desktop and Mobile)
- Any Rust application using
pgpcrate <= 0.10.2 -
rPGP: <= 0.10.2 (Fixed in:
0.11.0) -
Delta Chat Core: < 1.132.0 (Fixed in:
1.132.0)
Code Analysis
Commit: unknown
Release v0.11.0 containing fixes for MDC verification and other cryptographic issues.
N/A (Multiple PRs merged)
Exploit Details
- USENIX Security '24: Cryptographic Analysis of Delta Chat (Paper demonstrating the attack)
Mitigation Strategies
- Strict enforcement of MDC verification
- Adoption of AEAD (RFC 9580) encryption modes
- Rejection of deprecated SE (tag 9) packets
Remediation Steps:
- Update
rPGPcrate to version>= 0.11.0. - Rebuild application to ensure the new library version is linked.
- Audit application logic to ensure decryption errors result in a total drop of the message, not a warning.
- For Delta Chat users, update to desktop/mobile v1.44+.
References
- GitHub Advisory: rPGP Integrity Check Bypass
- IACR ePrint: In-Band Signaling Attacks against OpenPGP Clients
Read the full report for GHSA-C7PH-F7JM-XV4W on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)