Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 23 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jsrsasign Project
Jsrsasign Project jsrsasign |
|
| CPEs | cpe:2.3:a:jsrsasign_project:jsrsasign:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Jsrsasign Project
Jsrsasign Project jsrsasign |
Mon, 23 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | jsrsasign: jsrsasign: Private Key Recovery via Missing Cryptographic Step in DSA Signing | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kjur
Kjur jsrsasign |
|
| Vendors & Products |
Kjur
Kjur jsrsasign |
Mon, 23 Mar 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the package jsrsasign before 11.1.1 are vulnerable to Missing Cryptographic Step via the KJUR.crypto.DSA.signWithMessageHash process in the DSA signing implementation. An attacker can recover the private key by forcing r or s to be zero, so the library emits an invalid signature without retrying, and then solves for x from the resulting signature. | |
| Weaknesses | CWE-325 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2026-03-23T14:41:10.087Z
Reserved: 2026-03-22T16:26:10.973Z
Link: CVE-2026-4601
Updated: 2026-03-23T14:41:07.056Z
Status : Analyzed
Published: 2026-03-23T06:16:21.893
Modified: 2026-03-23T16:10:01.390
Link: CVE-2026-4601
OpenCVE Enrichment
Updated: 2026-03-23T09:45:31Z