Vulnerabilities/

Valid ECDSA signatures erroneously rejected in Elliptic

Severity:
Low

Description

The Elliptic prior to 6.6.0 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve’s base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected.

Recommendation

Update the elliptic package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
elliptic
Anything's wrong? Let us know Last updated on June 27, 2025

This issue is available in SmartScanner Professional

See Pricing