Vulnerability DatabaseGHSA-h864-m8vm-3xvj

GHSA-h864-m8vm-3xvj
Rust vulnerability analysis and mitigation

Overview

The vulnerability (GHSA-h864-m8vm-3xvj) affects the Post-Quantum Signature scheme Rainbow level I parametersets in the oqs Rust crate versions below 0.7.2. The vulnerability was discovered by Ward Beullens who found a practical key-recovery attack against Rainbow, which was announced on February 25, 2022. The affected systems include all oqs::sig::Algorithm::RainbowI* variants (NIST Forum, RustSec).

Technical details

The vulnerability allows for a practical key-recovery attack that can recover a private key for the Security Level I parameter set. The attack was demonstrated to work on a laptop in approximately 53 hours using the implementation of block Wiedemann XL. The attack was confirmed by the Rainbow team who acknowledged missing this simple attack vector (NIST Forum).

Impact

The vulnerability completely compromises the security of Rainbow Level I parameters, making it possible to recover private keys in a practical timeframe using modest computing resources. This affects any systems or applications relying on Rainbow Level I for post-quantum cryptographic signatures (GitHub Advisory).

Mitigation and workarounds

Users should upgrade to oqs version 0.7.2 or later, where the Rainbow level I parametersets have been removed. The Rainbow team proposed replacing the Level 1 parameters with Level 3 parameters and Level 3 with Level 5 parameters as a mitigation strategy (GitHub Advisory, NIST Forum).

Community reactions

The cryptographic community responded quickly to the discovery, with the Rainbow team promptly acknowledging the vulnerability and implementing the attack to verify its effectiveness. There were discussions about Rainbow's future in the NIST Post-Quantum Cryptography standardization process, with some experts suggesting that Rainbow should not advance to the next round (NIST Forum).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22698HIGH8.7
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22700HIGH7.5
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22699HIGH7.5
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22705MEDIUM6.4
  • RustRust
  • ml-dsa
NoYesJan 10, 2026
CVE-2025-15504MEDIUM4.8
  • PythonPython
  • lief
NoYesJan 10, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management