Access Restriction Bypass Affecting msrcrypto package, versions <1.5.8


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.49% (77th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-MSRCRYPTO-2331751
  • published7 Jan 2022
  • disclosed6 Jan 2022
  • creditUnknown

Introduced: 6 Jan 2022

CVE-2020-1026  (opens in a new tab)
CWE-682  (opens in a new tab)

How to fix?

Upgrade msrcrypto to version 1.5.8 or higher.

Overview

msrcrypto is a MSR JavaScript Cryptography Library.

Affected versions of this package are vulnerable to Access Restriction Bypass. A Security Feature Bypass vulnerability exists in the MSR JavaScript Cryptography Library that is caused by multiple bugs in the library’s Elliptic Curve Cryptography (ECC) implementation.

An attacker could potentially abuse these bugs to learn information about a server’s private ECC key (a key leakage attack) or craft an invalid ECDSA signature that nevertheless passes as valid.

The security update addresses the vulnerability by fixing the bugs disclosed in the ECC implementation. In addition, an internal review resulted in other improvements to prevent rare failures in ECDH and ECDSA when using the NUMS curves.

CVSS Scores

version 3.1