7.5
CVE-2026-22699
- EPSS 0.17%
- Veröffentlicht 10.01.2026 05:17:22
- Zuletzt bearbeitet 22.01.2026 14:53:30
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
RustCrypto: Elliptic Curves is general purpose Elliptic Curve Cryptography (ECC) support, including types and traits for representing various elliptic curve forms, scalars, points, and public/secret keys composed thereof. In versions 0.14.0-pre.0 and 0.14.0-rc.0, a denial-of-service vulnerability exists in the SM2 PKE decryption path where an invalid elliptic-curve point (C1) is decoded and the resulting value is unwrapped without checking. Specifically, AffinePoint::from_encoded_point(&encoded_c1) may return a None/CtOption::None when the supplied coordinates are syntactically valid but do not lie on the SM2 curve. The calling code previously used .unwrap(), causing a panic when presented with such input. This issue has been patched via commit 085b7be.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Rustcrypto ≫ Sm2 Elliptic Curve Version0.14.0 Updatepre0 SwPlatformrust
Rustcrypto ≫ Sm2 Elliptic Curve Version0.14.0 Updaterc0 SwPlatformrust
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.17% | 0.379 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security-advisories@github.com | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.