Versions of the package jsrsasign before 11.1.1 are vulnerable to Missing Cryptographic Step via the KJUR.crypto.DSA.signWithMessageHash process in the DSA signing implementation. An attacker can recover the private key by forcing r or s to be zero, so the library emits an invalid signature without retrying, and then solves for x from the resulting signature.
Metrics
Affected Vendors & Products
References
History
Mon, 23 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | jsrsasign: jsrsasign: Private Key Recovery via Missing Cryptographic Step in DSA Signing | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kjur
Kjur jsrsasign |
|
| Vendors & Products |
Kjur
Kjur jsrsasign |
Mon, 23 Mar 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the package jsrsasign before 11.1.1 are vulnerable to Missing Cryptographic Step via the KJUR.crypto.DSA.signWithMessageHash process in the DSA signing implementation. An attacker can recover the private key by forcing r or s to be zero, so the library emits an invalid signature without retrying, and then solves for x from the resulting signature. | |
| Weaknesses | CWE-325 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: snyk
Published: 2026-03-23T05:00:13.312Z
Updated: 2026-03-23T05:00:13.312Z
Reserved: 2026-03-22T16:26:10.973Z
Link: CVE-2026-4601
No data.
Status : Received
Published: 2026-03-23T06:16:21.893
Modified: 2026-03-23T06:16:21.893
Link: CVE-2026-4601