CVE-2024-49364
JavaScript vulnerability analysis and mitigation

Overview

tiny-secp256k1, a tiny secp256k1 native/JS wrapper, was found to contain a critical vulnerability (CVE-2024-49364) prior to version 1.1.7. The vulnerability affects environments where require('buffer') is the NPM buffer package, such as browser bundles and React Native apps. The issue was discovered and disclosed in June 2025 (GitHub Advisory).

Technical details

The vulnerability stems from a bypass of the Buffer.isBuffer check when signing a malicious JSON-stringifiable object. This bypass results in k reuse for different messages, which can lead to private key extraction through a single invalid message along with a second message/signature pair. The vulnerability is particularly concerning as it only requires a single malicious message to be signed for complete key extraction (GitHub Advisory).

Impact

The vulnerability allows for full private key extraction when signing a single malicious message that passes JSON.stringify/JSON.parse and can be received from the network. This is particularly severe as signing a single message should not result in private key exposure, even in cases where attacker-controlled messages are being signed (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 1.1.7 of tiny-secp256k1. Users are strongly advised to upgrade to this version or later. The fix involves proper validation of input types and prevention of Buffer.isBuffer check bypass (GitHub Pull).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management