CVE Vulnerabilities

CVE-2023-30588

Published: Nov 28, 2023 | Modified: Nov 03, 2025
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVSS 2.x
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20.

Affected Software

NameVendorStart VersionEnd Version
Node.jsNodejs16.0.0 (including)16.20.1 (excluding)
Node.jsNodejs18.0.0 (including)18.16.1 (excluding)
Node.jsNodejs20.0.0 (including)20.3.1 (excluding)
Red Hat Enterprise Linux 8RedHatnodejs:18-8080020230718130356.63b34585*
Red Hat Enterprise Linux 8RedHatnodejs:16-8080020230718141521.63b34585*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatnodejs:16-8060020230906023909.ad008a3a*
Red Hat Enterprise Linux 9RedHatnodejs:18-9020020230717125503.rhel9*
Red Hat Enterprise Linux 9RedHatnodejs-1:16.20.1-1.el9_2*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatnodejs-1:16.20.2-1.el9_0*
NodejsUbuntubionic*
NodejsUbuntukinetic*
NodejsUbuntulunar*
NodejsUbuntumantic*
NodejsUbuntutrusty*
NodejsUbuntuxenial*

References