Access Restriction Bypass Affecting msrcrypto package, versions <1.5.8
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-MSRCRYPTO-2331751
- published 7 Jan 2022
- disclosed 6 Jan 2022
- credit Unknown
Introduced: 6 Jan 2022
CVE-2020-1026 Open this link in a new tabHow to fix?
Upgrade msrcrypto
to version 1.5.8 or higher.
Overview
msrcrypto is a MSR JavaScript Cryptography Library.
Affected versions of this package are vulnerable to Access Restriction Bypass. A Security Feature Bypass vulnerability exists in the MSR JavaScript Cryptography Library that is caused by multiple bugs in the library’s Elliptic Curve Cryptography (ECC) implementation.
An attacker could potentially abuse these bugs to learn information about a server’s private ECC key (a key leakage attack) or craft an invalid ECDSA signature that nevertheless passes as valid.
The security update addresses the vulnerability by fixing the bugs disclosed in the ECC implementation. In addition, an internal review resulted in other improvements to prevent rare failures in ECDH and ECDSA when using the NUMS curves.