CVE-2024-49365
JavaScript vulnerability analysis and mitigation

Overview

tiny-secp256k1, a tiny secp256k1 native/JS wrapper, was found to contain a vulnerability (CVE-2024-49365) prior to version 1.1.7. The vulnerability was discovered and disclosed on June 29, 2025, affecting environments where require('buffer') is the NPM buffer package, such as browser bundles and React Native apps (GitHub Advisory).

Technical details

The vulnerability allows a malicious JSON-stringifyable message to bypass verification in the verify() function when the global Buffer is the buffer package. The Buffer.isBuffer check can be circumvented, allowing strange objects to be accepted as messages, which could trick verify() into returning false-positive true values. The vulnerability is tracked as CWE-347 (Improper Verification of Cryptographic Signature) and has received a CVSS v4.0 score of 8.1 (HIGH) (GitHub Advisory).

Impact

The vulnerability enables attackers to craft malicious messages that could be verified from any given known valid message/signature pair. This could lead to the acceptance of unauthorized or malicious messages as valid, potentially compromising the security of systems relying on the signature verification (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 1.1.7 of tiny-secp256k1. Users are advised to upgrade to this version to address the security issue. It's worth noting that v2.x of the library is unaffected as it verifies input to be an actual Uint8Array instance (GitHub Advisory, GitHub PR).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management