Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22863: CWE-325: Missing Cryptographic Step in denoland deno

0
Critical
VulnerabilityCVE-2026-22863cvecve-2026-22863cwe-325
Published: Thu Jan 15 2026 (01/15/2026, 22:53:15 UTC)
Source: CVE Database V5
Vendor/Project: denoland
Product: deno

Description

CVE-2026-22863 is a critical vulnerability in the Deno runtime prior to version 2. 6. 0, where the node:crypto module fails to finalize cipher operations properly. This flaw allows attackers to perform infinite encryptions without proper cryptographic finalization, enabling brute force or cryptanalysis attacks aimed at extracting server secrets. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. It impacts confidentiality severely by potentially exposing sensitive cryptographic keys or data. The issue is fixed in Deno 2. 6. 0. European organizations using vulnerable Deno versions in production environments are at high risk, especially those relying on Deno for secure cryptographic operations.

AI-Powered Analysis

AILast updated: 01/15/2026, 23:27:42 UTC

Technical Analysis

CVE-2026-22863 is a critical cryptographic vulnerability identified in the Deno runtime environment, specifically affecting versions prior to 2.6.0. Deno, a modern runtime for JavaScript, TypeScript, and WebAssembly, includes a node:crypto module for cryptographic operations. The vulnerability arises from a missing cryptographic step: the cipher is not properly finalized during encryption processes. Proper finalization is essential to ensure the integrity and security of cryptographic outputs. Without this step, attackers can perform unlimited encryption operations without the expected cryptographic protections, effectively bypassing safeguards that limit brute force or cryptanalysis attempts. This flaw enables attackers to attempt infinite encryptions, facilitating both naive brute force attacks and more sophisticated cryptanalytic methods aimed at revealing server-side secrets such as encryption keys or sensitive data. The vulnerability is exploitable remotely without requiring any authentication or user interaction, increasing its risk profile. Although no known exploits have been reported in the wild yet, the high CVSS score (9.2) reflects the severe potential impact. The issue was addressed and fixed in Deno version 2.6.0, which properly finalizes cipher operations to restore cryptographic integrity. Organizations using vulnerable Deno versions, especially in security-critical applications, face significant risks of data compromise or unauthorized access due to this flaw.

Potential Impact

For European organizations, the impact of CVE-2026-22863 is substantial, particularly for those leveraging Deno in backend services, cloud functions, or cryptographic workflows. The vulnerability compromises confidentiality by enabling attackers to bypass encryption protections and potentially extract sensitive cryptographic keys or data. This can lead to unauthorized data disclosure, undermining trust and compliance with data protection regulations such as GDPR. Integrity of encrypted communications or stored data may also be at risk if attackers manipulate encryption outputs. Availability is less directly impacted but could be affected if attackers leverage the vulnerability to disrupt cryptographic services. Given that no authentication or user interaction is required, the attack surface is broad, increasing exposure. Organizations in sectors with high security requirements—finance, healthcare, government, and critical infrastructure—are particularly vulnerable. Failure to remediate promptly could result in data breaches, regulatory penalties, and reputational damage. The vulnerability also poses risks to software supply chains if Deno is used in development or deployment pipelines.

Mitigation Recommendations

European organizations should immediately upgrade all Deno runtime environments to version 2.6.0 or later to ensure the cryptographic finalization step is correctly implemented. Conduct a comprehensive inventory of applications and services using Deno, focusing on those performing cryptographic operations. Review and audit all cryptographic code to confirm that encryption and decryption processes are correctly handled and do not rely on vulnerable versions. Implement network-level protections such as Web Application Firewalls (WAFs) and intrusion detection systems (IDS) to monitor for anomalous encryption-related traffic patterns indicative of brute force or cryptanalysis attempts. Employ strict access controls and segmentation to limit exposure of systems running vulnerable Deno versions. Establish monitoring and alerting for unusual cryptographic operation volumes or failures. Coordinate with software vendors and development teams to ensure timely patch deployment and secure coding practices. Finally, update incident response plans to include scenarios involving cryptographic vulnerabilities and potential data exfiltration.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-12T16:20:16.746Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696974917c726673b6855151

Added to database: 1/15/2026, 11:13:21 PM

Last enriched: 1/15/2026, 11:27:42 PM

Last updated: 1/16/2026, 12:23:08 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats