Rustcrypto Rsa vulnerabilities
5 known vulnerabilities affecting rustcrypto/rsa.
Total CVEs
5
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2MEDIUM2LOW1
Vulnerabilities
Page 1 of 1
CVE-2026-21895LOWCVSS 2.7fixed in 0.9.102026-01-08
CVE-2026-21895 [LOW] CWE-703 CVE-2026-21895: The `rsa` crate is an RSA implementation written in rust. Prior to version 0.9.10, when creating a R
The `rsa` crate is an RSA implementation written in rust. Prior to version 0.9.10, when creating a RSA private key from its components, the construction panics instead of returning an error when one of the primes is `1`. Version 0.9.10 fixes the issue.
ghsanvdosv
CVE-2023-49092MEDIUMCVSS 5.9≤ 0.9.52023-11-28
CVE-2023-49092 [MEDIUM] CWE-385 CVE-2023-49092: RustCrypto/RSA is a portable RSA implementation in pure Rust. Due to a non-constant-time implementat
RustCrypto/RSA is a portable RSA implementation in pure Rust. Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key. There is currently no fix available. As a workaround, avoid using the
ghsanvdosv
CVE-2016-1494MEDIUM≥ 0, < 3.32022-05-14
CVE-2016-1494 [MEDIUM] CWE-20 Python RSA allows attackers to spoof signatures
Python RSA allows attackers to spoof signatures
The verify function in the RSA package for Python (Python-RSA) before 3.3 allows attackers to spoof signatures with a small public exponent via crafted signature padding, aka a BERserk attack.
ghsaosv
CVE-2020-25658HIGH≥ 2.1, < 4.72021-04-30
CVE-2020-25658 [HIGH] CWE-327 Timing attacks in python-rsa
Timing attacks in python-rsa
It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA
ghsaosv
CVE-2020-13757HIGH≥ 0, < 4.12021-03-24
CVE-2020-13757 [HIGH] CWE-327 Python-RSA decryption of ciphertext leads to DoS
Python-RSA decryption of ciphertext leads to DoS
Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
ghsaosv