
Cloud Vulnerability DB
A community-led vulnerabilities database
The libsecp256k1 crate versions before 0.5.0 for Rust contained a significant security vulnerability (RUSTSEC-2021-0076/CVE-2021-38195) discovered in August 2021. The vulnerability allowed for the verification of invalid signatures by permitting the R or S parameters to be larger than the curve order, resulting in an overflow condition (NVD).
The vulnerability was classified with a CVSS v3.1 Base Score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue was categorized under CWE-347 (Improper Verification of Cryptographic Signature). The technical root cause involved the signature parsing mechanism that allowed overflow in the R and S parameters during signature verification (NVD).
The vulnerability could potentially allow attackers to bypass signature verification, leading to unauthorized access and potential system compromise. Given the CRITICAL CVSS score and the fundamental nature of the cryptographic vulnerability, the impact was considered severe for affected systems (NVD).
The vulnerability was addressed in version 0.5.0 of the libsecp256k1 crate. The fix involved implementing new non-overflowing signature parsing functions (parsestandard and parsestandard_slice) to replace the vulnerable methods. Users were advised to upgrade to version 0.5.0 or later to mitigate the vulnerability (Github PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."