tiny-secp256k1 is a tiny secp256k1 native/JS wrapper. Prior to version 1.1.7, a malicious JSON-stringifyable message can be made passing on verify(), when global Buffer is the buffer package. This affects only environments where require('buffer') is the NPM buffer package. Buffer.isBuffer check can be bypassed, resulting in strange objects being accepted as a message, and those messages could trick verify() into returning false-positive true values. This issue has been patched in version 1.1.7.
History

Tue, 01 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 01 Jul 2025 02:45:00 +0000

Type Values Removed Values Added
Description tiny-secp256k1 is a tiny secp256k1 native/JS wrapper. Prior to version 1.1.7, a malicious JSON-stringifyable message can be made passing on verify(), when global Buffer is the buffer package. This affects only environments where require('buffer') is the NPM buffer package. Buffer.isBuffer check can be bypassed, resulting in strange objects being accepted as a message, and those messages could trick verify() into returning false-positive true values. This issue has been patched in version 1.1.7.
Title tiny-secp256k1 allows for verify() bypass when running in bundled environment
Weaknesses CWE-347
References
Metrics cvssV4_0

{'score': 8.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-07-01T02:07:02.922Z

Updated: 2025-07-01T13:18:55.447Z

Reserved: 2024-10-14T13:56:34.810Z

Link: CVE-2024-49365

cve-icon Vulnrichment

Updated: 2025-07-01T13:18:02.984Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-01T03:15:21.327

Modified: 2025-07-03T15:14:12.767

Link: CVE-2024-49365

cve-icon Redhat

No data.