Use of a Cryptographic Primitive with a Risky Implementation Affecting ml-dsa package, versions <0.1.0-rc.3


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (3rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-MLDSA-14927476
  • published14 Jan 2026
  • disclosed13 Jan 2026
  • creditScott Arciszewski

Introduced: 13 Jan 2026

NewCVE-2026-22705  (opens in a new tab)
CWE-1240  (opens in a new tab)

How to fix?

Upgrade ml-dsa to version 0.1.0-rc.3 or higher.

Overview

Affected versions of this package are vulnerable to Use of a Cryptographic Primitive with a Risky Implementation due to non-constant-time division in the ML-DSA decomposition logic. An attacker can exploit timing differences during ML-DSA signing to gain information about secret-dependent values processed by high_bits() and low_bits(), potentially enabling partial key leakage over many observations.

CVSS Base Scores

version 4.0
version 3.1