Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-46809: Vulnerability in NodeJS Node

0
High
VulnerabilityCVE-2023-46809cvecve-2023-46809
Published: Sat Sep 07 2024 (09/07/2024, 16:03:32 UTC)
Source: CVE
Vendor/Project: NodeJS
Product: Node

Description

Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:00:32 UTC

Technical Analysis

CVE-2023-46809 is a cryptographic vulnerability in Node.js arising from the use of unpatched OpenSSL versions that permit PKCS #1 v1.5 padding during RSA private key decryption. The vulnerability, dubbed the Marvin Attack, exploits weaknesses in the padding scheme to allow attackers to decrypt RSA-encrypted data without requiring authentication or user interaction. Node.js versions 4.0 through 21.0 are affected if they bundle or dynamically link to vulnerable OpenSSL libraries. The flaw stems from improper handling of RSA decryption padding, classified under CWE-385 (Credential Management Errors), which can lead to exposure of sensitive cryptographic material or plaintext data. The attack vector is network-based (AV:N), with high attack complexity (AC:H), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality and integrity but does not affect availability. Although no public exploits are reported, the vulnerability poses a significant risk due to the widespread use of Node.js in web servers, APIs, and cloud services. The vulnerability was published on September 7, 2024, and is recognized by CISA as enriched intelligence. Mitigation involves updating Node.js to versions that include patched OpenSSL or ensuring the system OpenSSL is updated and disabling PKCS #1 v1.5 padding if feasible.

Potential Impact

For European organizations, this vulnerability threatens the confidentiality and integrity of sensitive data processed by Node.js applications, particularly those performing RSA decryption operations. Exploitation could lead to unauthorized decryption of encrypted communications, credentials, or other protected information, potentially resulting in data breaches, intellectual property theft, or compromise of secure communications. Industries such as finance, healthcare, government, and technology sectors that rely heavily on Node.js for backend services are at elevated risk. The vulnerability's network-based attack vector and lack of required privileges mean attackers can exploit it remotely without authentication, increasing the threat surface. Given the extensive use of Node.js in cloud-native and microservices architectures across Europe, the vulnerability could impact critical infrastructure and services. Although no active exploits are known, the high CVSS score and ease of exploitation necessitate urgent remediation to prevent future attacks.

Mitigation Recommendations

1. Immediately update Node.js to the latest versions that include patched OpenSSL libraries. Verify the Node.js distribution includes the fix for CVE-2023-46809. 2. For environments using dynamically linked OpenSSL, ensure the system OpenSSL libraries are updated to versions that mitigate the Marvin Attack. 3. Disable support for PKCS #1 v1.5 padding in RSA decryption operations if application logic and compatibility allow, favoring more secure padding schemes like OAEP. 4. Conduct a thorough inventory of all Node.js instances and services to identify affected versions and OpenSSL linkage. 5. Implement network-level monitoring for anomalous RSA decryption requests or unusual cryptographic operations. 6. Employ application-layer encryption and key management best practices to minimize exposure of private keys. 7. Engage in proactive threat hunting for signs of exploitation attempts, despite no known active exploits. 8. Educate development and operations teams about the vulnerability and ensure secure coding practices around cryptographic operations. 9. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block exploitation attempts targeting this vulnerability. 10. Regularly review and update cryptographic libraries and dependencies to prevent similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2023-10-27T01:00:13.401Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed59d

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 11/4/2025, 7:00:32 PM

Last updated: 12/5/2025, 12:42:16 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats