CVE Vulnerabilities

CVE-2022-24772

Improper Verification of Cryptographic Signature

Published: Mar 18, 2022 | Modified: Mar 28, 2022
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Ubuntu
MEDIUM

Forge (also called node-forge) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a DigestInfo ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. The issue has been addressed in node-forge version 1.3.0. There are currently no known workarounds.

Weakness

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Affected Software

Name Vendor Start Version End Version
Forge Digitalbazaar * 1.3.0 (excluding)
OpenShift Service Mesh 2.1 RedHat openshift-service-mesh/kiali-rhel8:1.36.9-1 *
Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8 RedHat rhacm2/console-rhel8:v2.4.4-4 *
Red Hat OpenShift Data Foundation 4.11 on RHEL8 RedHat odf4/mcg-core-rhel8:v4.11.0-30 *
Red Hat OpenShift Data Foundation 4.11 on RHEL8 RedHat odf4/odf-console-rhel8:v4.11.0-51 *
RHINT Service Registry 2.3.0 GA RedHat node-forge *
RHPAM 7.13.1 async RedHat node-forge *
Node-node-forge Ubuntu impish *
Node-node-forge Ubuntu kinetic *
Node-node-forge Ubuntu trusty *
Node-node-forge Ubuntu xenial *

References