Description
The ECDSA implementation of the Elliptic package generates incorrect signatures if an interim value of ‘k’ (as computed based on step 3.2 of RFC 6979 https://datatracker.ietf.org/doc/html/rfc6979 ) has leading zeros and is susceptible to cryptanalysis, which can lead to secret key exposure.
Recommendation
No fix is available yet. Followings are affected versions:
- <= 6.6.1
References
Related Issues
- Trix has a stored XSS vulnerability through its attachment attribute - Vulnerability
- Valid ECDSA signatures erroneously rejected in Elliptic - CVE-2024-48948
- Elliptic's verify function omits uniqueness validation - CVE-2024-48949
- Elliptic allows BER-encoded signatures - CVE-2024-42461
- Tags:
- npm
- elliptic
Anything's wrong? Let us know Last updated on January 09, 2026