
Cloud Vulnerability DB
A community-led vulnerabilities database
The ed25519-dalek crate before version 2 for Rust contains a critical security vulnerability that allows for a double public key signing function oracle attack. The vulnerability was disclosed on July 27, 2025, and is tracked as CVE-2022-50237. This security flaw affects the Keypair implementation in the ed25519-dalek cryptographic library (Red Hat XML, NVD).
The vulnerability has been assigned a CVSS 3.1 Base Score of 5.9 (Medium) with the vector string CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N. The flaw is categorized under CWE-497 (Exposure of Sensitive System Information to an Unauthorized Control Sphere). The vulnerability specifically relates to the Keypair implementation, which allows for a simple computation method that can extract a private key through observation of signatures generated with corresponding public keys (Red Hat XML).
The vulnerability enables attackers to extract private keys by observing repeated signatures, leading to unauthorized data signing capabilities. This compromise of cryptographic keys can result in serious security implications for systems relying on the ed25519-dalek implementation for digital signatures (Red Hat XML).
According to Red Hat's assessment, mitigation options for this vulnerability are either not available or do not meet their Product Security criteria for ease of use, deployment, and stability. Users are advised to upgrade to version 2 or later of the ed25519-dalek crate when available (Red Hat XML).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."