Home

Description

The implementation of EdDSA in EdDSA-Java (aka ed25519-java) through 0.3.0 exhibits signature malleability and does not satisfy the SUF-CMA (Strong Existential Unforgeability under Chosen Message Attacks) property. This allows attackers to create new valid signatures different from previous signatures for a known message.

PUBLISHED Reserved 2025-03-13 | Published 2025-03-13 | Updated 2025-03-18 | Assigner mitre




MEDIUM: 4.3CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

Problem types

CWE-347 Improper Verification of Cryptographic Signature

Product status

Default status
unknown

Any version
affected

References

github.com/str4d/ed25519-java/issues/82

eprint.iacr.org/2020/1244

cve.org (CVE-2020-36843)

nvd.nist.gov (CVE-2020-36843)

Download JSON