Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-4603

Опубликовано: 23 мар. 2026
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

Versions of the package jsrsasign before 11.1.1 are vulnerable to Division by zero due to the RSASetPublic/KEYUTIL parsing path in ext/rsa.js and the BigInteger.modPowInt reduction logic in ext/jsbn.js. An attacker can force RSA public-key operations (e.g., verify and encryption) to collapse to deterministic zero outputs and hide “invalid key” errors by supplying a JWK whose modulus decodes to zero.

A flaw was found in jsrsasign. An attacker can exploit a division by zero vulnerability by supplying a specially crafted JSON Web Key (JWK) whose modulus decodes to zero. This vulnerability can force RSA public-key operations, such as verification and encryption, to produce deterministic zero outputs. This impacts the reliability and integrity of cryptographic operations and can conceal "invalid key" errors.

Отчет

This flaw has a MODERATE impact. A division by zero vulnerability in jsrsasign, as used in Red Hat Migration Toolkit for Virtualization and Red Hat Quay, allows an attacker to provide a malicious JSON Web Key (JWK) that can lead to incorrect RSA public-key operation outputs and mask key validation errors. This compromises the reliability and integrity of cryptographic processes within affected Red Hat products.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Migration Toolkit for Virtualizationmigration-toolkit-virtualization/mtv-console-plugin-rhel9Fix deferred
Migration Toolkit for Virtualizationmtv-candidate/mtv-console-plugin-rhel9Fix deferred
Red Hat Quay 3quay/quay-rhel8Fix deferred
Red Hat Quay 3quay/quay-rhel9Fix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-369
https://bugzilla.redhat.com/show_bug.cgi?id=2450205jsrsasign: jsrsasign: Cryptographic operations impacted by division by zero via malicious JSON Web Key

EPSS

Процентиль: 1%
0.00009
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
nvd
17 дней назад

Versions of the package jsrsasign before 11.1.1 are vulnerable to Division by zero due to the RSASetPublic/KEYUTIL parsing path in ext/rsa.js and the BigInteger.modPowInt reduction logic in ext/jsbn.js. An attacker can force RSA public-key operations (e.g., verify and encryption) to collapse to deterministic zero outputs and hide “invalid key” errors by supplying a JWK whose modulus decodes to zero.

CVSS3: 5.9
github
17 дней назад

jsrsasign: Division by Zero Allows Invalid JWK Modulus to Cause Deterministic Zero Output in RSA Operations

EPSS

Процентиль: 1%
0.00009
Низкий

5.9 Medium

CVSS3