Vulnerability Details CVE-2021-38195
An issue was discovered in the libsecp256k1 crate before 0.5.0 for Rust. It can verify an invalid signature because it allows the R or S parameter to be larger than the curve order, aka an overflow.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 39.1%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2021-38195
-
cpe:2.3:a:parity:libsecp256k1:-
-
cpe:2.3:a:parity:libsecp256k1:0.1.0
-
cpe:2.3:a:parity:libsecp256k1:0.1.10
-
cpe:2.3:a:parity:libsecp256k1:0.1.11
-
cpe:2.3:a:parity:libsecp256k1:0.1.12
-
cpe:2.3:a:parity:libsecp256k1:0.1.13
-
cpe:2.3:a:parity:libsecp256k1:0.1.14
-
cpe:2.3:a:parity:libsecp256k1:0.1.15
-
cpe:2.3:a:parity:libsecp256k1:0.1.2
-
cpe:2.3:a:parity:libsecp256k1:0.1.3
-
cpe:2.3:a:parity:libsecp256k1:0.1.4
-
cpe:2.3:a:parity:libsecp256k1:0.1.5
-
cpe:2.3:a:parity:libsecp256k1:0.1.6
-
cpe:2.3:a:parity:libsecp256k1:0.1.7
-
cpe:2.3:a:parity:libsecp256k1:0.1.8
-
cpe:2.3:a:parity:libsecp256k1:0.1.9
-
cpe:2.3:a:parity:libsecp256k1:0.2.0
-
cpe:2.3:a:parity:libsecp256k1:0.2.1
-
cpe:2.3:a:parity:libsecp256k1:0.2.2
-
cpe:2.3:a:parity:libsecp256k1:0.3.0
-
cpe:2.3:a:parity:libsecp256k1:0.3.1
-
cpe:2.3:a:parity:libsecp256k1:0.3.2
-
cpe:2.3:a:parity:libsecp256k1:0.3.3
-
cpe:2.3:a:parity:libsecp256k1:0.3.4
-
cpe:2.3:a:parity:libsecp256k1:0.3.5