The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
{
"license": "CC-BY-4.0",
"sources": [
{
"modified": "2025-06-09T16:15:33Z",
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40528",
"id": "CVE-2021-40528",
"imported": "2026-04-17T00:51:47.261Z",
"published": "2021-09-06T19:15:07.587Z",
"database_specific": {
"status": "Modified"
},
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2021-40528"
}
]
}