Zero-Day in OpenPGP

UNKNOWN No Patch (2837 days)

Threat Intelligence

Low Risk
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

OpenPGP is a widely used cryptographic standard for secure communication. This vulnerability allows attackers to forge signatures and decrypt messages without needing the private key, potentially allowing unauthorized access to encrypted data.

Am I affected?

You're affected if you use OpenPGP software versions prior to 0.9.2. You can check by running gpg --version and looking for the version number. Note that this vulnerability is not specific to any particular implementation of OpenPGP, so it's essential to verify your software's version.

Affected Products

GNU Project / OpenPGP

How to fix

To fix this issue, update to OpenPGP 0.9.2 or later. You can download the latest version from the OpenPGP website: https://www.openpgp.org/software/. If you cannot upgrade immediately, consider disabling key signing until you have a chance to update.