CVE-2024-48948 Affecting node-elliptic package, versions <6.6.1+dfsg-1


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-NODEELLIPTIC-8222733
  • published16 Oct 2024
  • disclosed15 Oct 2024

Introduced: 15 Oct 2024

CVE-2024-48948  (opens in a new tab)

How to fix?

Upgrade Debian:unstable node-elliptic to version 6.6.1+dfsg-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream node-elliptic package and not the node-elliptic package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.

CVSS Base Scores

version 3.1