Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2739: Infinite loop in bn.js

0
Medium
VulnerabilityCVE-2026-2739cvecve-2026-2739
Published: Fri Feb 20 2026 (02/20/2026, 05:00:08 UTC)
Source: CVE Database V5
Product: bn.js

Description

CVE-2026-2739 is a medium severity vulnerability in bn. js versions prior to 5. 2. 3. The issue arises when the maskn(0) method is called on any BN instance, corrupting the internal state and causing methods like toString() and divmod() to enter an infinite loop. This results in the affected process hanging indefinitely, leading to a denial of service. The vulnerability requires no authentication or user interaction and can be triggered remotely if the vulnerable code is exposed to untrusted input. No known exploits are currently reported in the wild. Organizations using bn. js in cryptographic or numerical computations should update to version 5.

AI-Powered Analysis

AILast updated: 02/20/2026, 05:31:46 UTC

Technical Analysis

CVE-2026-2739 identifies a vulnerability in the bn.js library, a widely used JavaScript library for arbitrary precision arithmetic. The flaw exists in versions before 5.2.3 and is triggered by invoking the maskn(0) method on any BN instance. This call corrupts the internal state of the BN object, causing critical methods such as toString() and divmod() to enter an infinite loop. The infinite loop causes the JavaScript runtime process to hang indefinitely, effectively resulting in a denial of service (DoS). The vulnerability does not require any privileges, authentication, or user interaction to exploit, and can be triggered remotely if the vulnerable function is exposed to attacker-controlled input. The CVSS 4.0 score of 6.9 reflects a medium severity, emphasizing the ease of exploitation and impact on availability but limited impact on confidentiality or integrity. No known exploits have been reported in the wild, but the vulnerability poses a risk to any application relying on bn.js for cryptographic or numerical operations, especially in server-side or critical infrastructure contexts. The patch was released in version 5.2.3, and upgrading is the primary remediation step.

Potential Impact

The primary impact of this vulnerability is a denial of service caused by infinite loops that hang the affected process. This can disrupt applications that rely on bn.js for big number calculations, including cryptographic operations, blockchain platforms, financial services, and other JavaScript-based systems. The hang can lead to service outages, degraded performance, and potential cascading failures in dependent systems. Since the vulnerability can be triggered remotely without authentication, exposed services using vulnerable versions are at risk of being targeted for DoS attacks. While confidentiality and integrity are not directly impacted, the availability disruption can have significant operational and reputational consequences for organizations. The scope includes any system using vulnerable bn.js versions, which is common in Node.js environments and web applications globally.

Mitigation Recommendations

The most effective mitigation is to upgrade bn.js to version 5.2.3 or later, where the infinite loop issue is resolved. Organizations should audit their software dependencies to identify and update any usage of vulnerable bn.js versions. For environments where immediate upgrade is not feasible, implementing input validation to prevent calls to maskn(0) or sanitizing inputs that could trigger this method can reduce risk. Additionally, deploying runtime monitoring and timeout mechanisms can help detect and recover from infinite loops to maintain service availability. Incorporating dependency scanning tools in CI/CD pipelines will help prevent vulnerable versions from being deployed. Finally, isolating critical services and limiting exposure of vulnerable components to untrusted inputs can reduce the attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
snyk
Date Reserved
2026-02-19T10:59:37.687Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6997ee52d7880ec89b7878a3

Added to database: 2/20/2026, 5:17:06 AM

Last enriched: 2/20/2026, 5:31:46 AM

Last updated: 2/20/2026, 6:18:49 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats