The package elliptic before 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0704 The package elliptic before 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.
Github GHSA Github GHSA GHSA-r9p9-mrjm-926w Elliptic Uses a Broken or Risky Cryptographic Algorithm
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Indutny
Indutny elliptic
CPEs cpe:2.3:a:elliptic_project:elliptic:*:*:*:*:*:node.js:*:* cpe:2.3:a:indutny:elliptic:*:*:*:*:*:node.js:*:*
Vendors & Products Elliptic Project
Elliptic Project elliptic
Indutny
Indutny elliptic

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-09-17T02:00:51.979Z

Reserved: 2020-11-12T00:00:00

Link: CVE-2020-28498

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-02-02T19:15:13.720

Modified: 2024-11-21T05:22:54.743

Link: CVE-2020-28498

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.