CVE-2024-42460

In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero.
References
Link Resource
https://github.com/indutny/elliptic/pull/317 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:indutny:elliptic:6.5.6:*:*:*:*:node.js:*:*

History

20 Jun 2025, 16:28

Type Values Removed Values Added
CPE cpe:2.3:a:indutny:elliptic:6.5.6:*:*:*:*:node.js:*:*
First Time Indutny
Indutny elliptic
References () https://github.com/indutny/elliptic/pull/317 - () https://github.com/indutny/elliptic/pull/317 - Exploit, Issue Tracking

02 Aug 2024, 16:35

Type Values Removed Values Added
CWE CWE-130
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

02 Aug 2024, 12:59

Type Values Removed Values Added
Summary
  • (es) En el paquete Elliptic 6.5.6 para Node.js, la maleabilidad de la firma ECDSA se produce porque falta una verificación de si el bit inicial de r y s es cero.

02 Aug 2024, 07:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-02 07:16

Updated : 2025-06-20 16:28


NVD link : CVE-2024-42460

Mitre link : CVE-2024-42460

CVE.ORG link : CVE-2024-42460


JSON object : View

Products Affected

indutny

  • elliptic
CWE
CWE-130

Improper Handling of Length Parameter Inconsistency