CVE-2026-24785
January 27, 2026
Clatter is a no_std compatible, pure Rust implementation of the Noise protocol framework with post-quantum support. Versiosn prior to2.2.0 have a protocol compliance vulnerability. The library allowed post-quantum handshake patterns that violated the PSK validity rule (Noise Protocol Framework Section 9.3). This could allow PSK-derived keys to be used for encryption without proper randomization by self-chosen ephemeral randomness, weakening security guarantees and potentially allowing catastrophic key reuse. Affected default patterns include "noise_pqkk_psk0", "noise_pqkn_psk0", "noise_pqnk_psk0", "noise_pqnn_psk0``, and some hybrid variants. Users of these patterns may have been using handshakes that do not meet the intended security properties. The issue is fully patched and released in Clatter v2.2.0. The fixed version includes runtime checks to detect offending handshake patterns. As a workaround, avoid using offending "*_psk0` variants of post-quantum patterns. Review custom handshake patterns carefully.
Affected Packages
https://github.com/jmlepisto/clatter.git (GITHUB):
Affected version(s) >=clatter-v0.1.1-alpha <clatter-v2.2.0Fix Suggestion:
Update to version clatter-v2.2.0clatter (RUST):
Affected version(s) >=0.1.0-alpha <2.2.0Fix Suggestion:
Update to version 2.2.0clatter (RUST):
Affected version(s) >=0.1.0-alpha <2.2.0Fix Suggestion:
Update to version 2.2.0Related Resources (5)
Do you need more information?
Contact UsCVSS v4
Base Score:
8
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
Exploit Maturity
UNREPORTED
CVSS v3
Base Score:
9.1
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
NONE
Weakness Type (CWE)
Use of a Broken or Risky Cryptographic Algorithm
EPSS
Base Score:
0.01