CVE-2024-23342
Python vulnerability analysis and mitigation

Overview

The ecdsa PyPI package, a pure Python implementation of ECC (Elliptic Curve Cryptography) with support for ECDSA, EdDSA, and ECDH, has been found vulnerable to the Minerva attack in versions 0.18.0 and prior. The vulnerability was discovered in January 2024 and assigned CVE-2024-23342. The vulnerability affects the package's implementation of ECDSA signature generation (GitHub Advisory).

Technical details

The vulnerability stems from a timing side-channel leak during scalar multiplication operations in ECDSA signature generation. The implementation leaks the bit-length of the random nonce used in signing operations, which can be exploited through statistical analysis of signature timing measurements. The vulnerability has been assigned a CVSS v3.1 base score of 7.4 (High), with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N (GitHub Advisory).

Impact

An attacker who can measure the duration of hundreds to thousands of signing operations of known messages can potentially recover the private key. The attack requires observing timing differences in signature generation, with less noise in measurement requiring fewer signatures. The computation of the private key can be completed in seconds or minutes once sufficient signatures are collected (Minerva).

Mitigation and workarounds

As of the vulnerability disclosure, no patched version exists. The project's security policy states that side-channel vulnerabilities are outside the scope of the project, not because they don't want side-channel secure implementation, but because the main goal is to be pure Python and implementing side-channel free code in pure Python is impossible. Users are advised to use quality wrappers around OpenSSL, such as pyca/cryptography, for security-critical applications (Security Policy).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22612HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22609HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22608HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22691LOW2.7
  • PythonPython
  • pypdf
NoYesJan 10, 2026
CVE-2026-22690LOW2.7
  • PythonPython
  • pypdf
NoYesJan 10, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management