First published: Wed Apr 15 2020(Updated: )
A Security Feature Bypass vulnerability exists in the MSR JavaScript Cryptography Library that is caused by multiple bugs in the library’s Elliptic Curve Cryptography (ECC) implementation.An attacker could potentially abuse these bugs to learn information about a server’s private ECC key (a key leakage attack) or craft an invalid ECDSA signature that nevertheless passes as valid.The security update addresses the vulnerability by fixing the bugs disclosed in the ECC implementation, aka 'MSR JavaScript Cryptography Library Security Feature Bypass Vulnerability'.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Research JavaScript Cryptography Library | =1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1026 has a medium severity rating due to the potential for an attacker to learn information about a server's private ECC key.
To mitigate CVE-2020-1026, upgrade to a patched version of the Microsoft Research JavaScript Cryptography Library.
CVE-2020-1026 specifically affects version 1.4 of the Microsoft Research JavaScript Cryptography Library.
An attacker exploiting CVE-2020-1026 could potentially compromise the security of the ECC implementation and access sensitive cryptographic keys.
CVE-2020-1026 is specifically tied to vulnerabilities within the ECC implementation of the MSR JavaScript Cryptography Library.