logo

CVE-2020-28498 elliptic

Package

Manager: npm
Name: elliptic
Vulnerable Version: >=0 <6.5.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00473 pctl0.63736

Details

Elliptic Uses a Broken or Risky Cryptographic Algorithm The npm package `elliptic` before version 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.

Metadata

Created: 2021-03-08T16:06:50Z
Modified: 2023-09-06T23:43:30Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/03/GHSA-r9p9-mrjm-926w/GHSA-r9p9-mrjm-926w.json
CWE IDs: ["CWE-327"]
Alternative ID: GHSA-r9p9-mrjm-926w
Finding: F052
Auto approve: 1