All versions of the package sjcl are vulnerable to Improper Verification of Cryptographic Signature due to missing point-on-curve validation in sjcl.ecc.basicKey.publicKey(). An attacker can recover a victim's ECDH private key by sending crafted off-curve public keys and observing ECDH outputs. The dhJavaEc() function directly returns the raw x-coordinate of the scalar multiplication result (no hashing), providing a plaintext oracle without requiring any decryption feedback.
References
Configurations
No configuration.
History
17 Mar 2026, 14:20
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-325 | |
| References | () https://gist.github.com/Kr0emer/2560f98edb10b0b34f2438cd63913c47 - | |
| References | () https://security.snyk.io/vuln/SNYK-JS-SJCL-15369617 - |
17 Mar 2026, 06:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-17 06:16
Updated : 2026-03-17 14:20
NVD link : CVE-2026-4258
Mitre link : CVE-2026-4258
CVE.ORG link : CVE-2026-4258
JSON object : View
Products Affected
No product.
