We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54885

Thinbus generates insufficient entropy: 252 bits vs minimum 256 bits



Description

Thinbus Javascript Secure Remote Password is a browser SRP6a implementation for zero-knowledge password authentication. In versions 2.0.0 and below, a protocol compliance bug causes the client to generate a fixed 252 bits of entropy instead of the intended bit length of the safe prime (defaulted to 2048 bits). The client public value is being generated from a private value that is 4 bits below the specification. This reduces the protocol's designed security margin it is now practically exploitable. The servers full sized 2048 bit random number is used to create the shared session key and password proof. This is fixed in version 2.0.1.

Reserved 2025-07-31 | Published 2025-08-07 | Updated 2025-08-07 | Assigner GitHub_M


MEDIUM: 6.9CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U

Problem types

CWE-331: Insufficient Entropy

Product status

< 2.0.1
affected

References

github.com/...rp-npm/security/advisories/GHSA-8q6v-474h-whgg

github.com/simbo1905/thinbus-srp-npm/issues/28

github.com/...mmits/4aeaea2366e090765a8204059c7bcf3616438d31

cve.org (CVE-2025-54885)

nvd.nist.gov (CVE-2025-54885)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54885

Support options

Helpdesk Chat, Email, Knowledgebase