CVE-2024-48948

The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:indutny:elliptic:6.5.7:*:*:*:*:node.js:*:*

History

20 Jun 2025, 16:18

Type Values Removed Values Added
CPE cpe:2.3:a:indutny:elliptic:6.5.7:*:*:*:*:node.js:*:*
First Time Indutny
Indutny elliptic
References () https://security.netapp.com/advisory/ntap-20241220-0004/ - () https://security.netapp.com/advisory/ntap-20241220-0004/ - Third Party Advisory
References () https://github.com/indutny/elliptic/pull/322 - () https://github.com/indutny/elliptic/pull/322 - Exploit, Issue Tracking
References () https://github.com/indutny/elliptic/issues/321 - () https://github.com/indutny/elliptic/issues/321 - Exploit, Issue Tracking

20 Dec 2024, 13:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20241220-0004/ -

15 Oct 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-15 14:15

Updated : 2025-06-20 16:18


NVD link : CVE-2024-48948

Mitre link : CVE-2024-48948


JSON object : View

Products Affected

indutny

  • elliptic
CWE

No CWE.