Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4598: Infinite loop in jsrsasign

0
High
VulnerabilityCVE-2026-4598cvecve-2026-4598
Published: Mon Mar 23 2026 (03/23/2026, 05:00:11 UTC)
Source: CVE Database V5
Product: jsrsasign

Description

Versions of the package jsrsasign before 11.1.1 are vulnerable to Infinite loop via the bnModInverse function in ext/jsbn2.js when the BigInteger.modInverse implementation receives zero or negative inputs, allowing an attacker to hang the process permanently by supplying such crafted values (e.g., modInverse(0, m) or modInverse(-1, m)).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 06:01:54 UTC

Technical Analysis

CVE-2026-4598 is a vulnerability in the jsrsasign library, a widely used JavaScript cryptographic toolkit. The issue lies in the bnModInverse function within ext/jsbn2.js, which implements the BigInteger.modInverse method. This method is designed to compute the modular inverse of a number, a critical operation in many cryptographic algorithms. However, when the function receives zero or negative inputs, it fails to handle these edge cases correctly, resulting in an infinite loop. Specifically, calls such as modInverse(0, m) or modInverse(-1, m) cause the function to hang indefinitely, leading to a denial-of-service (DoS) condition. The vulnerability can be triggered remotely without any authentication or user interaction, making it highly exploitable. The flaw affects all versions of jsrsasign prior to 11.1.1, which have not implemented proper input validation or error handling for these cases. The CVSS 4.0 base score of 8.7 indicates a high severity due to network attack vector, low attack complexity, no privileges or user interaction required, and a high impact on availability. While no known exploits have been reported in the wild, the potential for service disruption is significant, especially in environments where jsrsasign is used for critical cryptographic functions in web applications, APIs, or backend services. The vulnerability underscores the importance of robust input validation in cryptographic libraries to prevent denial-of-service attacks.

Potential Impact

The primary impact of CVE-2026-4598 is a denial-of-service condition caused by an infinite loop in the jsrsasign library. Organizations using vulnerable versions of jsrsasign in their applications risk having their services hung or crashed when processing maliciously crafted inputs. This can lead to service outages, degraded performance, and potential cascading failures in dependent systems. Since jsrsasign is often used in web applications, APIs, and other JavaScript-based environments for cryptographic operations, the vulnerability could be exploited remotely without authentication, increasing the attack surface. The disruption could affect availability of critical services, potentially impacting user trust and business continuity. Although confidentiality and integrity are not directly compromised, the inability to process legitimate cryptographic operations could halt secure communications or transactions. Large-scale or automated exploitation could lead to widespread denial-of-service attacks against organizations relying on jsrsasign, especially those with high traffic or exposed endpoints. The absence of known exploits in the wild suggests limited current impact, but the ease of exploitation and high severity score warrant immediate attention.

Mitigation Recommendations

To mitigate CVE-2026-4598, organizations should immediately upgrade jsrsasign to version 11.1.1 or later, where the infinite loop issue has been addressed. If upgrading is not immediately feasible, implement input validation controls to ensure that values passed to the modInverse function are strictly positive and non-zero before invocation. Application-level sanitization can prevent malicious inputs from reaching the vulnerable function. Additionally, implement runtime monitoring and alerting for unusually high CPU usage or process hangs in services using jsrsasign, enabling rapid detection of potential exploitation attempts. Employ rate limiting and input filtering at network boundaries to reduce exposure to crafted requests. For critical systems, consider isolating cryptographic operations in separate processes or containers with resource limits to contain potential denial-of-service effects. Regularly review and update dependencies to incorporate security patches promptly. Finally, conduct security testing focusing on edge cases in cryptographic functions to identify similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
snyk
Date Reserved
2026-03-22T16:25:51.590Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c0d39df4197a8e3b12da3d

Added to database: 3/23/2026, 5:46:05 AM

Last enriched: 3/23/2026, 6:01:54 AM

Last updated: 3/24/2026, 6:09:46 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses