GHSA-fc9h-whq2-v747
GitHub Security Advisory
Valid ECDSA signatures erroneously rejected in Elliptic
✓ GitHub Reviewed
LOW
Has CVE
Advisory Details
The Elliptic prior to 6.6.0 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.
Affected Packages
npm
elliptic
Affected versions:
0
(fixed in 6.6.0)
Related CVEs
Key Information
2.5
/10
Dataset
Last updated: September 16, 2025 6:29 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.