CVE-2026-4598
HIGH
7,7
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
HIGH
7,5
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high
Description
AI Translation Available
Versions of the package jsrsasign before 11.1.1 are vulnerable to Infinite loop via the bnModInverse function in ext/jsbn2.js when the BigInteger.modInverse implementation receives zero or negative inputs, allowing an attacker to hang the process permanently by supplying such crafted values (e.g., modInverse(0, m) or modInverse(-1, m)).
835
Loop with Unreachable Exit Condition ('Infinite Loop')
IncompleteCommon Consequences
Security Scopes Affected:
Availability
Potential Impacts:
Dos: Resource Consumption (Cpu)
Dos: Resource Consumption (Memory)
Dos: Amplification
Applicable Platforms
All platforms may be affected
https://gist.github.com/Kr0emer/a1bf5cd4547cc630d2dcc5e761de8264
https://github.com/kjur/jsrsasign/commit/ca5b027240287a1e71fe63019fc44003325943…
https://github.com/kjur/jsrsasign/pull/648
https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-15370938