Access Restriction Bypass Affecting msrcrypto package, versions <1.5.8



    Attack Complexity Low
    Confidentiality High
    Integrity High
    Availability High
Expand this section
9.8 critical

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-MSRCRYPTO-2331751
  • published 7 Jan 2022
  • disclosed 6 Jan 2022
  • credit Unknown

How to fix?

Upgrade msrcrypto to version 1.5.8 or higher.


msrcrypto is a MSR JavaScript Cryptography Library. Affected versions of this package are vulnerable to Access Restriction Bypass. A Security Feature Bypass vulnerability exists in the MSR JavaScript Cryptography Library that is caused by multiple bugs in the library’s Elliptic Curve Cryptography (ECC) implementation.

An attacker could potentially abuse these bugs to learn information about a server’s private ECC key (a key leakage attack) or craft an invalid ECDSA signature that nevertheless passes as valid.

The security update addresses the vulnerability by fixing the bugs disclosed in the ECC implementation. In addition, an internal review resulted in other improvements to prevent rare failures in ECDH and ECDSA when using the NUMS curves.