First published: Fri Jan 19 2024(Updated: )
### Impact RSA PKCS#1.5 or RSAOAEP ciphertexts may be decrypted by this Marvin attack vulnerability. ### Patches update to jsrsasign 11.0.0. ### Workarounds Find and replace RSA and RSAOAEP decryption with other crypto library. ### References https://people.redhat.com/~hkario/marvin/ https://github.com/kjur/jsrsasign/issues/598 https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6070732 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21484
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
npm/jsrsasign | <11.0.0 | 11.0.0 |
Jsrsasign | <11.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21484 is classified as a significant vulnerability due to its ability to allow RSA PKCS#1.5 or RSAOAEP ciphertexts to be decrypted through a specific attack.
To fix CVE-2024-21484, you should update to jsrsasign version 11.0.0.
CVE-2024-21484 affects decryption using RSA PKCS#1.5 and RSAOAEP algorithms.
A recommended workaround for CVE-2024-21484 is to replace RSA and RSAOAEP decryption with an alternative cryptography library.
The software package impacted by CVE-2024-21484 is jsrsasign, specifically versions below 11.0.0.