Versions of the package jsrsasign before 11.1.1 are vulnerable to Missing Cryptographic Step via the KJUR.crypto.DSA.signWithMessageHash process in the DSA signing implementation. An attacker can recover the private key by forcing r or s to be zero, so the library emits an invalid signature without retrying, and then solves for x from the resulting signature.
Metrics
Affected Vendors & Products
References
History
Mon, 23 Mar 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the package jsrsasign before 11.1.1 are vulnerable to Missing Cryptographic Step via the KJUR.crypto.DSA.signWithMessageHash process in the DSA signing implementation. An attacker can recover the private key by forcing r or s to be zero, so the library emits an invalid signature without retrying, and then solves for x from the resulting signature. | |
| Weaknesses | CWE-325 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2026-03-23T05:00:13.312Z
Reserved: 2026-03-22T16:26:10.973Z
Link: CVE-2026-4601
No data.
Status : Received
Published: 2026-03-23T06:16:21.893
Modified: 2026-03-23T06:16:21.893
Link: CVE-2026-4601
No data.
OpenCVE Enrichment
No data.