CRITICAL · 9.1

CVE-2019-14859

A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted,...

Vulnerability Description

A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions.

CVSS Score

9.1

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
NONE

Affected Products

VendorProductVersions
Python-Ecdsa ProjectPython-Ecdsa< 0.13.3
RedhatCeph Storage2.0
RedhatOpenstack10
RedhatVirtualization4.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-14859?

CVE-2019-14859 is a vulnerability with a CVSS score of 9.1 (CRITICAL). A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted,...

How severe is CVE-2019-14859?

CVE-2019-14859 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2019-14859?

Check the references section above for vendor advisories and patch information. Affected products include: Python-Ecdsa Project Python-Ecdsa, Redhat Ceph Storage, Redhat Openstack, Redhat Virtualization.