CVE-2020-1026 – msrcrypto
Package
Manager: npm
Name: msrcrypto
Vulnerable Version: >=0 <1.5.8
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.01462 pctl0.80126
Details
Incorrect Calculation in the MSR JavaScript Cryptography Library A Security Feature Bypass vulnerability exists in the MSR JavaScript Cryptography Library that is caused by multiple bugs in the library's Elliptic Curve Cryptography (ECC) implementation.An attacker could potentially abuse these bugs to learn information about a server's private ECC key (a key leakage attack) or craft an invalid ECDSA signature that nevertheless passes as valid.The security update addresses the vulnerability by fixing the bugs disclosed in the ECC implementation, aka `MSR JavaScript Cryptography Library Security Feature Bypass Vulnerability`.
Metadata
Created: 2022-01-06T19:44:01Z
Modified: 2021-10-20T22:19:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-9x9j-836w-8f55/GHSA-9x9j-836w-8f55.json
CWE IDs: ["CWE-682"]
Alternative ID: GHSA-9x9j-836w-8f55
Finding: F138
Auto approve: 1