The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.
https://security.netapp.com/advisory/ntap-20241220-0004/
Published: 2024-10-15
Updated: 2024-12-20
Base Score: 4
Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:P
Severity: Medium
Base Score: 4.8
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
Severity: Medium
Base Score: 2.3
Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
Severity: Low
EPSS: 0.0008