CVE-2025-45764: CWE-326 Inadequate Encryption Strength in jsrsasign project jsrsasign
jsrsasign v11.1.0 was discovered to contain weak encryption. NOTE: this issue has been disputed by a third party who believes that CVE IDs can be assigned for key lengths in specific applications that use a library, and should not be assigned to the default key lengths in a library. This dispute is subject to review under CNA rules 4.1.4, 4.1.14, and other rules; the dispute tagging is not meant to recommend an outcome for this CVE Record.
AI Analysis
Technical Summary
CVE-2025-45764 is a high-severity vulnerability identified in the jsrsasign library version 11.1.0, which is a widely used JavaScript library for cryptographic signing and verification. The vulnerability stems from the use of weak encryption algorithms or implementations within the library, classified under CWE-327 (Use of a Broken or Risky Cryptographic Algorithm). This weakness can undermine the confidentiality and integrity of cryptographic operations performed by applications relying on jsrsasign, potentially allowing attackers to decrypt sensitive data, forge signatures, or bypass authentication mechanisms. The CVSS v3.1 score of 7.0 reflects a network attack vector (AV:N) with high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The impact includes low confidentiality and integrity loss but high availability impact, indicating that exploitation could disrupt services or cause denial of service. Although no known exploits are currently in the wild and no patches have been linked yet, the vulnerability's presence in a cryptographic library used in web applications and services poses a significant risk if exploited. The lack of specified affected versions beyond 11.1.0 suggests that the issue may be isolated to this release, but users should verify their usage and update accordingly once patches are available.
Potential Impact
For European organizations, this vulnerability could have serious consequences, especially for those relying on jsrsasign for secure communications, digital signatures, or authentication in web applications and services. The weak encryption could lead to unauthorized data disclosure, manipulation of signed data, or service disruptions, impacting sectors such as finance, healthcare, government, and critical infrastructure. Given the high availability impact, attackers might cause denial-of-service conditions, affecting business continuity. Additionally, the compromise of cryptographic assurances could erode trust in digital transactions and compliance with regulations like GDPR, which mandates protection of personal data. Organizations using jsrsasign in client-side or server-side environments should be particularly cautious, as exploitation can occur remotely without user interaction or authentication, increasing the risk of widespread impact.
Mitigation Recommendations
Organizations should immediately audit their software dependencies to identify any usage of jsrsasign version 11.1.0. Until an official patch is released, consider the following mitigations: 1) Replace or upgrade jsrsasign to a version confirmed to have fixed the weak encryption issue once available; 2) Where feasible, switch to alternative, well-maintained cryptographic libraries with strong encryption standards; 3) Implement additional layers of encryption or integrity checks at the application level to mitigate risks from weak cryptography; 4) Monitor network traffic and application logs for unusual cryptographic failures or anomalies that could indicate exploitation attempts; 5) Restrict network exposure of services using the vulnerable library, employing firewalls and segmentation; 6) Educate development teams about secure cryptographic practices to avoid reliance on weak algorithms; 7) Prepare incident response plans for potential cryptographic compromise scenarios. Proactive vulnerability scanning and dependency management tools should be employed to detect and remediate such issues promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Finland
CVE-2025-45764: CWE-326 Inadequate Encryption Strength in jsrsasign project jsrsasign
Description
jsrsasign v11.1.0 was discovered to contain weak encryption. NOTE: this issue has been disputed by a third party who believes that CVE IDs can be assigned for key lengths in specific applications that use a library, and should not be assigned to the default key lengths in a library. This dispute is subject to review under CNA rules 4.1.4, 4.1.14, and other rules; the dispute tagging is not meant to recommend an outcome for this CVE Record.
AI-Powered Analysis
Technical Analysis
CVE-2025-45764 is a high-severity vulnerability identified in the jsrsasign library version 11.1.0, which is a widely used JavaScript library for cryptographic signing and verification. The vulnerability stems from the use of weak encryption algorithms or implementations within the library, classified under CWE-327 (Use of a Broken or Risky Cryptographic Algorithm). This weakness can undermine the confidentiality and integrity of cryptographic operations performed by applications relying on jsrsasign, potentially allowing attackers to decrypt sensitive data, forge signatures, or bypass authentication mechanisms. The CVSS v3.1 score of 7.0 reflects a network attack vector (AV:N) with high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The impact includes low confidentiality and integrity loss but high availability impact, indicating that exploitation could disrupt services or cause denial of service. Although no known exploits are currently in the wild and no patches have been linked yet, the vulnerability's presence in a cryptographic library used in web applications and services poses a significant risk if exploited. The lack of specified affected versions beyond 11.1.0 suggests that the issue may be isolated to this release, but users should verify their usage and update accordingly once patches are available.
Potential Impact
For European organizations, this vulnerability could have serious consequences, especially for those relying on jsrsasign for secure communications, digital signatures, or authentication in web applications and services. The weak encryption could lead to unauthorized data disclosure, manipulation of signed data, or service disruptions, impacting sectors such as finance, healthcare, government, and critical infrastructure. Given the high availability impact, attackers might cause denial-of-service conditions, affecting business continuity. Additionally, the compromise of cryptographic assurances could erode trust in digital transactions and compliance with regulations like GDPR, which mandates protection of personal data. Organizations using jsrsasign in client-side or server-side environments should be particularly cautious, as exploitation can occur remotely without user interaction or authentication, increasing the risk of widespread impact.
Mitigation Recommendations
Organizations should immediately audit their software dependencies to identify any usage of jsrsasign version 11.1.0. Until an official patch is released, consider the following mitigations: 1) Replace or upgrade jsrsasign to a version confirmed to have fixed the weak encryption issue once available; 2) Where feasible, switch to alternative, well-maintained cryptographic libraries with strong encryption standards; 3) Implement additional layers of encryption or integrity checks at the application level to mitigate risks from weak cryptography; 4) Monitor network traffic and application logs for unusual cryptographic failures or anomalies that could indicate exploitation attempts; 5) Restrict network exposure of services using the vulnerable library, employing firewalls and segmentation; 6) Educate development teams about secure cryptographic practices to avoid reliance on weak algorithms; 7) Prepare incident response plans for potential cryptographic compromise scenarios. Proactive vulnerability scanning and dependency management tools should be employed to detect and remediate such issues promptly.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6893b15fad5a09ad00f39db7
Added to database: 8/6/2025, 7:47:43 PM
Last enriched: 8/6/2025, 8:02:52 PM
Last updated: 8/9/2025, 12:49:11 AM
Views: 11
Related Threats
CVE-2025-7020: CWE-656: Incorrect Encryption Implementation in BYD DiLink OS
MediumCVE-2025-8752: Command Injection in wangzhixuan spring-shiro-training
MediumCVE-2025-8751: Cross Site Scripting in Protected Total WebShield Extension
LowCVE-2025-8750: Cross Site Scripting in macrozheng mall
MediumCVE-2025-8746: Memory Corruption in GNU libopts
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.