Indutny Elliptic
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Indutny Elliptic.
By the Year
In 2026 there have been 1 vulnerability in Indutny Elliptic with an average score of 5.6 out of ten. Elliptic did not have any published security vulnerabilities last year. That is, 1 more vulnerability have already been reported in 2026 as compared to last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 1 | 5.60 |
| 2025 | 0 | 0.00 |
| 2024 | 4 | 6.13 |
| 2023 | 0 | 0.00 |
| 2022 | 0 | 0.00 |
| 2021 | 1 | 6.80 |
| 2020 | 1 | 7.70 |
It may take a day or so for new Elliptic vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Indutny Elliptic Security Vulnerabilities
Elliptic 6.6.1 ECDSA Bug: k Leading Zeros Truncate Secret Key
CVE-2025-14505
5.6 - Medium
- January 08, 2026
The ECDSA implementation of the Elliptic package generates incorrect signatures if an interim value of 'k' (as computed based on step 3.2 of RFC 6979 https://datatracker.ietf.org/doc/html/rfc6979 ) has leading zeros and is susceptible to cryptanalysis, which can lead to secret key exposure. This happens, because the byte-length of 'k' is incorrectly computed, resulting in its getting truncated during the computation. Legitimate transactions or communications will be broken as a result. Furthermore, due to the nature of the fault, attackers couldunder certain conditionsderive the secret key, if they could get their hands on both a faulty signature generated by a vulnerable version of Elliptic and a correct signature for the same inputs. This issue affects all known versions of Elliptic (at the time of writing, versions less than or equal to 6.6.1).
Use of a Risky Cryptographic Primitive
Elliptic 6.5.7 Node.js ECDSA Valid Signature Rejects due to TruncateToN
CVE-2024-48948
4.8 - Medium
- October 15, 2024
The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.
Improper Verification of Cryptographic Signature
Elliptic <6.5.6 Node.js eddsa Verify Sig.S Validation Omitted
CVE-2024-48949
9.1 - Critical
- October 10, 2024
The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits "sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()" validation.
Improper Verification of Cryptographic Signature
Elliptic 6.5.6: ECDSA Signature Malleability (r/s Leading Bit)
CVE-2024-42460
5.3 - Medium
- August 02, 2024
In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero.
length manipulation
Elliptic 6.5.6 Node.js: EDDSA Signature Malleability due to Len Check
CVE-2024-42459
5.3 - Medium
- August 02, 2024
In the Elliptic package 6.5.6 for Node.js, EDDSA signature malleability occurs because there is a missing signature length check, and thus zero-valued bytes can be removed or appended.
Improper Verification of Cryptographic Signature
The package elliptic before 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js
CVE-2020-28498
6.8 - Medium
- February 02, 2021
The package elliptic before 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.
Use of a Broken or Risky Cryptographic Algorithm
The Elliptic package 6.5.2 for Node.js
CVE-2020-13822
7.7 - High
- June 04, 2020
The Elliptic package 6.5.2 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.
Integer Overflow or Wraparound
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Indutny Elliptic or by Indutny? Click the Watch button to subscribe.