The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.
References
| Link | Resource |
|---|---|
| https://blog.trailofbits.com/2025/11/18/we-found-cryptography-bugs-in-the-elliptic-library-using-wycheproof/ | |
| https://github.com/indutny/elliptic/issues/321 | Exploit Issue Tracking |
| https://github.com/indutny/elliptic/pull/322 | Exploit Issue Tracking |
| https://security.netapp.com/advisory/ntap-20241220-0004/ | Third Party Advisory |
Configurations
History
25 Nov 2025, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2024-10-15 14:15
Updated : 2025-11-25 16:16
NVD link : CVE-2024-48948
Mitre link : CVE-2024-48948
CVE.ORG link : CVE-2024-48948
JSON object : View
Products Affected
indutny
- elliptic
CWE
CWE-347
Improper Verification of Cryptographic Signature
