First published: Tue Oct 15 2024(Updated: )
The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm/elliptic | <6.6.0 | 6.6.0 |
IBM Cognos Analytics | <=1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48948 has a high severity due to the potential for signature verification bypass in elliptic curve cryptography.
To fix CVE-2024-48948, update the Elliptic package to version 6.6.0 or later.
CVE-2024-48948 affects the Elliptic package version 6.5.7 for Node.js and IBM Cognos Analytics Mobile (iOS) up to version 1.1.
CVE-2024-48948 addresses a flaw in the ECDSA implementation of the Elliptic package that improperly verifies signatures with specific hash characteristics.
There is currently no public indication that CVE-2024-48948 is being actively exploited, but its vulnerabilities should be addressed as a precaution.