Vulnerability Description
The ML-DSA crate is a Rust implementation of the Module-Lattice-Based Digital Signature Standard (ML-DSA). Starting in version 0.0.4 and prior to version 0.1.0-rc.4, the ML-DSA signature verification implementation in the RustCrypto `ml-dsa` crate incorrectly accepts signatures with repeated (duplicate) hint indices. According to the ML-DSA specification (FIPS 204 / RFC 9881), hint indices within each polynomial must be **strictly increasing**. The current implementation uses a non-strict monotonic check (`<=` instead of `<`), allowing duplicate indices. This is a regression bug. The original implementation was correct, but a commit in version 0.0.4 inadvertently changed the strict `<` comparison to `<=`, introducing the vulnerability. Version 0.1.0-rc.4 fixes the issue.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://csrc.nist.gov/pubs/fips/204/final
- https://datatracker.ietf.org/doc/html/rfc9881
- https://github.com/C2SP/wycheproof
- https://github.com/C2SP/wycheproof/blob/master/testvectors_v1/mldsa_44_verify_te
- https://github.com/C2SP/wycheproof/blob/master/testvectors_v1/mldsa_65_verify_te
- https://github.com/C2SP/wycheproof/blob/master/testvectors_v1/mldsa_87_verify_te
- https://github.com/RustCrypto/signatures/commit/400961412be2e2ab787942cf30e0a9b6
- https://github.com/RustCrypto/signatures/commit/b01c3b73dd08d0094e089aa234f78b60
- https://github.com/RustCrypto/signatures/issues/894
- https://github.com/RustCrypto/signatures/pull/895
- https://github.com/RustCrypto/signatures/security/advisories/GHSA-5x2r-hc65-25f9
FAQ
What is CVE-2026-24850?
CVE-2026-24850 is a vulnerability with a CVSS score of 5.3 (MEDIUM). The ML-DSA crate is a Rust implementation of the Module-Lattice-Based Digital Signature Standard (ML-DSA). Starting in version 0.0.4 and prior to version 0.1.0-rc.4, the ML-DSA signature verification ...
How severe is CVE-2026-24850?
CVE-2026-24850 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-24850?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.