CVE Vulnerabilities

CVE-2022-24773

Improper Verification of Cryptographic Signature

Published: Mar 18, 2022 | Modified: Mar 28, 2022
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Ubuntu
MEDIUM

Forge (also called node-forge) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not properly check DigestInfo for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. The issue has been addressed in node-forge version 1.3.0. There are currently no known workarounds.

Weakness

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Affected Software

Name Vendor Start Version End Version
Forge Digitalbazaar * 1.3.0 (excluding)
OpenShift Service Mesh 2.1 RedHat openshift-service-mesh/kiali-rhel8:1.36.9-1 *
Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8 RedHat rhacm2/console-rhel8:v2.4.4-4 *
Red Hat OpenShift Data Foundation 4.11 on RHEL8 RedHat odf4/mcg-core-rhel8:v4.11.0-30 *
Red Hat OpenShift Data Foundation 4.11 on RHEL8 RedHat odf4/odf-console-rhel8:v4.11.0-51 *
RHINT Service Registry 2.3.0 GA RedHat node-forge *
Node-node-forge Ubuntu impish *
Node-node-forge Ubuntu kinetic *
Node-node-forge Ubuntu trusty *
Node-node-forge Ubuntu xenial *

References