Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4602: Incorrect Conversion between Numeric Types in jsrsasign

0
High
VulnerabilityCVE-2026-4602cvecve-2026-4602
Published: Mon Mar 23 2026 (03/23/2026, 05:00:10 UTC)
Source: CVE Database V5
Product: jsrsasign

Description

Versions of the package jsrsasign before 11.1.1 are vulnerable to Incorrect Conversion between Numeric Types due to handling negative exponents in ext/jsbn2.js. An attacker can force the computation of incorrect modular inverses and break signature verification by calling modPow with a negative exponent.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 06:01:00 UTC

Technical Analysis

CVE-2026-4602 is a vulnerability identified in the jsrsasign JavaScript cryptographic library, specifically affecting versions before 11.1.1. The root cause lies in the ext/jsbn2.js file, where the library incorrectly handles negative exponents during modular exponentiation operations performed by the modPow function. Modular exponentiation is fundamental in cryptographic algorithms such as RSA and DSA for operations like signature verification. The vulnerability allows an attacker to supply a negative exponent, which leads to an incorrect calculation of modular inverses. This results in the failure of signature verification processes, effectively allowing an attacker to forge or bypass digital signatures. The flaw does not require any privileges, authentication, or user interaction, and can be exploited remotely over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P) reflects a high impact on the integrity of affected systems with no confidentiality or availability impact. Although no public exploits have been observed, the vulnerability poses a severe risk to any system relying on jsrsasign for cryptographic validation, including web applications, APIs, and client-side cryptographic operations. The issue was reserved and published in March 2026, and the recommended fix is upgrading to jsrsasign version 11.1.1 or later, where the numeric conversion logic has been corrected to properly handle negative exponents.

Potential Impact

The primary impact of CVE-2026-4602 is the compromise of cryptographic signature verification integrity. Systems relying on jsrsasign for validating digital signatures, such as authentication tokens, software updates, or secure communications, may be tricked into accepting forged or tampered data. This can lead to unauthorized access, privilege escalation, or execution of malicious code under the guise of trusted signatures. Since the vulnerability can be exploited remotely without authentication or user interaction, it significantly increases the attack surface for threat actors. Organizations using jsrsasign in client-side or server-side applications risk data integrity breaches, undermining trust in their security mechanisms. The vulnerability does not directly affect confidentiality or availability but indirectly threatens these by enabling further attacks that rely on signature bypass. The lack of known exploits in the wild currently reduces immediate risk, but the high CVSS score and ease of exploitation make rapid patching critical to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2026-4602, organizations should immediately upgrade all instances of jsrsasign to version 11.1.1 or later, where the numeric conversion flaw has been fixed. For environments where immediate upgrade is not feasible, consider implementing input validation to reject negative exponents passed to modPow or wrapping the function to sanitize inputs. Conduct a thorough audit of all cryptographic operations relying on jsrsasign to identify potential exposure points. Employ defense-in-depth by combining cryptographic signature verification with additional integrity checks or multi-factor authentication where applicable. Monitor network traffic and application logs for anomalous calls to cryptographic functions that may indicate exploitation attempts. Educate development teams about secure usage of cryptographic libraries and the risks of improper numeric handling. Finally, maintain an up-to-date inventory of all software dependencies to ensure timely patching of similar vulnerabilities in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
snyk
Date Reserved
2026-03-22T16:26:15.167Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c0d39ff4197a8e3b12db12

Added to database: 3/23/2026, 5:46:07 AM

Last enriched: 3/23/2026, 6:01:00 AM

Last updated: 3/25/2026, 7:22:57 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses