First published: Fri Sep 23 2022(Updated: )
A weak randomness in WebCrypto keygen vulnerability exists in Node.js 18 due to a change with EntropySource() in SecretKeyGenTraits::DoKeyGen() in src/crypto/crypto_keygen.cc. There are two problems with this: 1) It does not check the return value, it assumes EntropySource() always succeeds, but it can (and sometimes will) fail. 2) The random data returned byEntropySource() may not be cryptographically strong and therefore not suitable as keying material.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <1:16.17.1-1.el9_0 | 1:16.17.1-1.el9_0 |
Nodejs Node.js | >=15.0.0<=15.14.0 | |
Nodejs Node.js | >=16.0.0<=16.12.0 | |
Nodejs Node.js | >=16.13.0<16.17.1 | |
Nodejs Node.js | >=18.0.0<18.9.1 | |
Siemens Sinec Ins | <1.0 | |
Siemens Sinec Ins | =1.0 | |
Siemens Sinec Ins | =1.0-sp1 | |
Siemens Sinec Ins | =1.0-sp2 | |
Debian Debian Linux | =11.0 | |
debian/nodejs | 10.24.0~dfsg-1~deb10u1 10.24.0~dfsg-1~deb10u3 12.22.12~dfsg-1~deb11u4 18.13.0+dfsg1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-35255 is a vulnerability found in NodeJS due to weak randomness in the WebCrypto keygen within the SecretKeyGenTraits::DoKeyGen() function.
CVE-2022-35255 has a severity value of 9.1, which is considered critical.
NodeJS versions up to and including 16.17.1 and 18.9.1 are affected by CVE-2022-35255.
To fix CVE-2022-35255, update your NodeJS installation to version 16.17.1 or higher for NodeJS 16, and version 18.9.1 or higher for NodeJS 18.
You can find more information about CVE-2022-35255 at the following references: [NodeJS September 2022 Security Releases](https://nodejs.org/en/blog/vulnerability/september-2022-security-releases/), [Red Hat Bugzilla - CVE-2022-35255](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2130524), [Red Hat Bugzilla - CVE-2022-35255](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2130523).