Lucene search

K
cve[email protected]CVE-2023-25653
HistoryFeb 16, 2023 - 7:15 p.m.

CVE-2023-25653

2023-02-1619:15:14
CWE-835
web.nvd.nist.gov
21
node-jose
cve-2023-25653
ecc operations
dos
security patch
web browsers
node.js-based servers

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

37.1%

node-jose is a JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for web browsers and node.js-based servers. Prior to version 2.2.0, when using the non-default “fallback” crypto back-end, ECC operations in node-jose can trigger a Denial-of-Service (DoS) condition, due to a possible infinite loop in an internal calculation. For some ECC operations, this condition is triggered randomly; for others, it can be triggered by malicious input. The issue has been patched in version 2.2.0. Since this issue is only present in the “fallback” crypto implementation, it can be avoided by ensuring that either WebCrypto or the Node crypto module is available in the JS environment where node-jose is being run.

Affected configurations

Vulners
NVD
Node
cisconode-joseRange<2.2.0
VendorProductVersionCPE
cisconode\-jose*cpe:2.3:a:cisco:node\-jose:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "cisco",
    "product": "node-jose",
    "versions": [
      {
        "version": "< 2.2.0",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

37.1%