Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-848j-6mx2-7j84

Опубликовано: 08 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 2.9
CVSS3: 5.6

Описание

Elliptic Uses a Cryptographic Primitive with a Risky Implementation

The ECDSA implementation of the Elliptic package generates incorrect signatures if an interim value of 'k' (as computed based on step 3.2 of RFC 6979 https://datatracker.ietf.org/doc/html/rfc6979 ) has leading zeros and is susceptible to cryptanalysis, which can lead to secret key exposure. This happens, because the byte-length of 'k' is incorrectly computed, resulting in its getting truncated during the computation. Legitimate transactions or communications will be broken as a result. Furthermore, due to the nature of the fault, attackers could–under certain conditions–derive the secret key, if they could get their hands on both a faulty signature generated by a vulnerable version of Elliptic and a correct signature for the same inputs.

This issue affects all known versions of Elliptic (at the time of writing, versions less than or equal to 6.6.1).

Пакеты

Наименование

elliptic

npm
Затронутые версииВерсия исправления

<= 6.6.1

Отсутствует

EPSS

Процентиль: 5%
0.00021
Низкий

2.9 Low

CVSS4

5.6 Medium

CVSS3

Дефекты

CWE-1240

Связанные уязвимости

CVSS3: 5.6
ubuntu
30 дней назад

The ECDSA implementation of the Elliptic package generates incorrect signatures if an interim value of 'k' (as computed based on step 3.2 of RFC 6979 https://datatracker.ietf.org/doc/html/rfc6979 ) has leading zeros and is susceptible to cryptanalysis, which can lead to secret key exposure. This happens, because the byte-length of 'k' is incorrectly computed, resulting in its getting truncated during the computation. Legitimate transactions or communications will be broken as a result. Furthermore, due to the nature of the fault, attackers could–under certain conditions–derive the secret key, if they could get their hands on both a faulty signature generated by a vulnerable version of Elliptic and a correct signature for the same inputs. This issue affects all known versions of Elliptic (at the time of writing, versions less than or equal to 6.6.1).

CVSS3: 5.6
nvd
30 дней назад

The ECDSA implementation of the Elliptic package generates incorrect signatures if an interim value of 'k' (as computed based on step 3.2 of RFC 6979 https://datatracker.ietf.org/doc/html/rfc6979 ) has leading zeros and is susceptible to cryptanalysis, which can lead to secret key exposure. This happens, because the byte-length of 'k' is incorrectly computed, resulting in its getting truncated during the computation. Legitimate transactions or communications will be broken as a result. Furthermore, due to the nature of the fault, attackers could–under certain conditions–derive the secret key, if they could get their hands on both a faulty signature generated by a vulnerable version of Elliptic and a correct signature for the same inputs. This issue affects all known versions of Elliptic (at the time of writing, versions less than or equal to 6.6.1).

CVSS3: 5.6
debian
30 дней назад

The ECDSA implementation of the Elliptic package generates incorrect s ...

EPSS

Процентиль: 5%
0.00021
Низкий

2.9 Low

CVSS4

5.6 Medium

CVSS3

Дефекты

CWE-1240