First published: Thu Oct 10 2024(Updated: )
The Elliptic package 6.5.5 for Node.js for EDDSA implementation does not perform the required check if the signature proof(s) is within the bounds of the order n of the base point of the elliptic curve, leading to signature malleability. Namely, the `verify` function in `lib/elliptic/eddsa/index.js` omits `sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()` validation. This vulnerability could have a security-relevant impact if an application relies on the uniqueness of a signature.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm/elliptic | <6.5.6 | 6.5.6 |
indutny Elliptic | <6.5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48949 is a critical vulnerability due to the potential for signature malleability in the Elliptic package.
To fix CVE-2024-48949, update the Elliptic package to version 6.5.6 or later.
CVE-2024-48949 affects the Elliptic package versions before 6.5.6.
CVE-2024-48949 is classified as a signature malleability vulnerability in an EDDSA implementation.
CVE-2024-48949 occurs in the `verify` function within `lib/elliptic/eddsa/index.js` of the Elliptic package.