Indutny Elliptic vulnerabilities

8 known vulnerabilities affecting indutny/elliptic.

Total CVEs
8
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH1MEDIUM4LOW2

Vulnerabilities

Page 1 of 1
CVE-2025-14505LOW≥ 0, ≤ 6.6.12026-01-08
CVE-2025-14505 [LOW] CWE-1240 Elliptic Uses a Cryptographic Primitive with a Risky Implementation Elliptic Uses a Cryptographic Primitive with a Risky Implementation The ECDSA implementation of the Elliptic package generates incorrect signatures if an interim value of 'k' (as computed based on step 3.2 of RFC 6979 https://datatracker.ietf.org/doc/html/rfc6979 ) has leading zeros and is susceptible to cryptanalysis, which can lead to secret key exposure. This happens, because the byte-length of
ghsaosv
CVE-2024-48948MEDIUMCVSS 4.8v6.5.72024-10-15
CVE-2024-48948 [MEDIUM] CWE-347 CVE-2024-48948: The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify v The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactio
ghsanvdosv
CVE-2024-48949CRITICALCVSS 9.1fixed in 6.5.62024-10-10
CVE-2024-48949 [CRITICAL] CWE-347 CVE-2024-48949: The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits "sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()" validation.
ghsanvdosv
CVE-2024-42460MEDIUMCVSS 5.3v6.5.62024-08-02
CVE-2024-42460 [MEDIUM] CWE-130 CVE-2024-42460: In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a mi In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero.
ghsanvdosv
CVE-2024-42459MEDIUMCVSS 5.3v6.5.62024-08-02
CVE-2024-42459 [MEDIUM] CWE-347 CVE-2024-42459: In the Elliptic package 6.5.6 for Node.js, EDDSA signature malleability occurs because there is a mi In the Elliptic package 6.5.6 for Node.js, EDDSA signature malleability occurs because there is a missing signature length check, and thus zero-valued bytes can be removed or appended.
ghsanvdosv
CVE-2024-42461LOW≥ 5.2.1, < 6.5.72024-08-02
CVE-2024-42461 [LOW] CWE-347 Elliptic allows BER-encoded signatures Elliptic allows BER-encoded signatures In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because BER-encoded signatures are allowed.
ghsaosv
CVE-2020-28498MEDIUMCVSS 6.8fixed in 6.5.42021-02-02
CVE-2020-28498 [MEDIUM] CWE-327 CVE-2020-28498: The package elliptic before 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implement The package elliptic before 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed af
ghsanvdosv
CVE-2020-13822HIGHCVSS 7.7v6.5.22020-06-04
CVE-2020-13822 [HIGH] CWE-190 CVE-2020-13822: The Elliptic package 6.5.2 for Node.js allows ECDSA signature malleability via variations in encodin The Elliptic package 6.5.2 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.
ghsanvdosv