Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-4599

Опубликовано: 23 мар. 2026
Источник: redhat
CVSS3: 9.1

Описание

Versions of the package jsrsasign from 7.0.0 and before 11.1.1 are vulnerable to Incomplete Comparison with Missing Factors via the getRandomBigIntegerZeroToMax and getRandomBigIntegerMinToMax functions in src/crypto-1.1.js; an attacker can recover the private key by exploiting the incorrect compareTo checks that accept out-of-range candidates and thus bias DSA nonces during signature generation.

A flaw was found in jsrsasign. An attacker can exploit an incomplete comparison vulnerability in the getRandomBigIntegerZeroToMax and getRandomBigIntegerMinToMax functions. By manipulating incorrect comparison checks, an attacker can bias the Digital Signature Algorithm (DSA) nonces during signature generation. This allows the attacker to recover the private key, leading to a critical security compromise.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Migration Toolkit for Virtualizationmigration-toolkit-virtualization/mtv-console-plugin-rhel9Affected
Migration Toolkit for Virtualizationmtv-candidate/mtv-console-plugin-rhel9Will not fix
Red Hat Quay 3quay/quay-rhel9Affected
Red Hat Quay 3.1quay/quay-rhel8FixedRHSA-2026:691207.04.2026
Red Hat Quay 3.12quay/quay-rhel8FixedRHSA-2026:672006.04.2026
Red Hat Quay 3.15quay/quay-rhel8FixedRHSA-2026:656803.04.2026
Red Hat Quay 3.9quay/quay-rhel8FixedRHSA-2026:692607.04.2026

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-338
https://bugzilla.redhat.com/show_bug.cgi?id=2450207jsrsasign: jsrsasign: Private key recovery via incomplete comparison checks biasing DSA nonces

9.1 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.1
nvd
17 дней назад

Versions of the package jsrsasign from 7.0.0 and before 11.1.1 are vulnerable to Incomplete Comparison with Missing Factors via the getRandomBigIntegerZeroToMax and getRandomBigIntegerMinToMax functions in src/crypto-1.1.js; an attacker can recover the private key by exploiting the incorrect compareTo checks that accept out-of-range candidates and thus bias DSA nonces during signature generation.

CVSS3: 9.1
github
17 дней назад

jsrsasign: Incomplete Comparison Allows DSA Private Key Recovery via Biased Nonce Generation

9.1 Critical

CVSS3