Debian Node-Node-Forge vulnerabilities

7 known vulnerabilities affecting debian/node-node-forge.

Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH4MEDIUM2

Vulnerabilities

Page 1 of 1
CVE-2025-12816HIGHCVSS 8.62025
CVE-2025-12816 [HIGH] CVE-2025-12816: node-node-forge - An interpretation-conflict (CWE-436) vulnerability in node-forge versions 1.3.1 ... An interpretation-conflict (CWE-436) vulnerability in node-forge versions 1.3.1 and earlier enables unauthenticated attackers to craft ASN.1 structures to desynchronize schema validations, yielding a semantic divergence that may bypass downstream cryptographic verifications and security decisions. Scope: local bullseye: open
debian
CVE-2025-66031HIGHCVSS 8.72025
CVE-2025-66031 [HIGH] CVE-2025-66031: node-node-forge - Forge (also called `node-forge`) is a native implementation of Transport Layer S... Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion wh
debian
CVE-2025-66030MEDIUMCVSS 6.32025
CVE-2025-66030 [MEDIUM] CVE-2025-66030: node-node-forge - Forge (also called `node-forge`) is a native implementation of Transport Layer S... Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise trun
debian
CVE-2022-24771HIGHCVSS 7.5fixed in node-node-forge 0.10.0~dfsg-3+deb11u1 (bullseye)2022
CVE-2022-24771 [HIGH] CVE-2022-24771: node-node-forge - Forge (also called `node-forge`) is a native implementation of Transport Layer S... Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signa
debian
CVE-2022-24772HIGHCVSS 7.5fixed in node-node-forge 0.10.0~dfsg-3+deb11u1 (bullseye)2022
CVE-2022-24772 [HIGH] CVE-2022-24772: node-node-forge - Forge (also called `node-forge`) is a native implementation of Transport Layer S... Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low pub
debian
CVE-2022-24773MEDIUMCVSS 5.3fixed in node-node-forge 0.10.0~dfsg-3+deb11u1 (bullseye)2022
CVE-2022-24773 [MEDIUM] CVE-2022-24773: node-node-forge - Forge (also called `node-forge`) is a native implementation of Transport Layer S... Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not properly check `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. The issue h
debian
CVE-2020-7720CRITICALCVSS 9.8fixed in node-node-forge 0.10.0~dfsg-1 (bullseye)2020
CVE-2020-7720 [CRITICAL] CVE-2020-7720: node-node-forge - The package node-forge before 0.10.0 is vulnerable to Prototype Pollution via th... The package node-forge before 0.10.0 is vulnerable to Prototype Pollution via the util.setPath function. Note: Version 0.10.0 is a breaking change removing the vulnerable functions. Scope: local bullseye: resolved (fixed in 0.10.0~dfsg-1)
debian