SiteShadow
Back to vulnerability library

CWE-323 Reusing a Nonce or IV

What this means

SiteShadow flagged nonce/IV reuse across encryptions. Many modern crypto schemes require a unique nonce/IV per message; reusing it can break confidentiality (and sometimes integrity).

Why it matters

Nonce or IV reuse can break encryption guarantees.

Safer examples

1) Use libraries that manage nonces/IVs safely

Prefer high-level APIs that generate nonces and return them with ciphertext.

2) Prefer AEAD modes

Use AES‑GCM / ChaCha20‑Poly1305 and ensure nonces are unique per key.

3) If you must manage nonces yourself, enforce uniqueness

Use a counter-based nonce or random nonces with collision resistance, and never repeat for the same key.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage