A major con of CBC is the so-called padding oracle attack.
Padding is often performed with PKCS#7 padding. If the end of your message requires bytes to fill the last block, PKCS#7 will append bytes of value to make everything whole.
This means that the receiver of a ciphertext coming from a CBC mode can throw an "invalid padding" error if it looks at the ciphertext's last byte and sees some byte in the last that doesn't also equal .
The padding oracle attack exploits malleability: the ability of an attacker to modify the ciphertext to a cryptosystem in a way that meaningfully changes the decrypted plaintext. CBC is malleable because changing changes .
As a result, a receiver that throws an invalid padding error (serves as a "padding oracle") in a CBC is prone to the padding oracle attack as follows:
Step 1: Recover the length of the padding.
Let . Change the first byte of , which changes the first byte of , and send the modified to the oracle .
If an error occurs, we know we changed a byte (the first in the last block) that was part of the padding. We conclude that consists entirely of padding. If no error occurs, the padding stayed intact despite our change, so change the next byte until we get an error. Once that happens, we know we have modified (hence, found) the first byte of padding.
Denote the distance of this byte to the end of the message by .
Part 2: Recover the last block.
We know the last bytes have value ; we'll try to guess the last character before the padding. Pick a "trial byte" , a value used to determine the plaintext byte through oracle feedback. Let's query on , replacing with , where
So we replace the last non-padding byte with our guess and each padding byte with .
Why? Decrypting the modified gives
Recall that the last bytes of are . They evaluate to by definition of . Every other byte of , except the last non-padding byte (call it ), remains the same. That one becomes .
Now recall the PKCS#7 invariant: the last byte's value is the number of suffix bytes with that value. So if has valid padding, its last bytes must be , including . Therefore, we can validate our guess based on whether gives a padding error. If it doesn't, then
So we recover . Of course, this strategy is not specific to . We continue with , which gives us the bytes before and, therefore, the rest of block .
Part 3: Recover the rest of the blocks.
Recall that is at most the length of one block. To recover block , then, drop the last ciphertext block and change the last byte of until there is no padding error.
Now that our ciphertext properly decrypts, repeat Part 1 to find the new padding of , and repeat Part 2 to recover its bytes.
Repeat this until every block of the ciphertext is recovered.
Read more in my 475 notes.