Elliptic's ECDSA missing check for whether leading bit of r and s is zero
- Severity:
- Low
Description
In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero.
Recommendation
Update the elliptic package to the latest compatible version. Followings are version details:
- Affected version(s): >= 2.0.0, <= 6.5.6
- Patched version(s): 6.5.7
References
Related Issues
- Valid ECDSA signatures erroneously rejected in Elliptic - CVE-2024-48948
- Volto affected by possible DoS by invoking specific URL by anonymous user - CVE-2025-58047
- Elliptic allows BER-encoded signatures - CVE-2024-42461
- Elliptic's EDDSA missing signature length check - CVE-2024-42459
- Tags:
- npm
- elliptic
Anything's wrong? Let us know Last updated on November 04, 2025