PT-2026-27059 · Jsrsasign · Jsrsasign
Kr0Emer
·
Published
2026-03-23
·
Updated
2026-03-23
·
CVE-2026-4603
CVSS v3.1
5.9
Medium
| AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
Versions of the package jsrsasign before 11.1.1 are vulnerable to Division by zero due to the RSASetPublic/KEYUTIL parsing path in ext/rsa.js and the BigInteger.modPowInt reduction logic in ext/jsbn.js. An attacker can force RSA public-key operations (e.g., verify and encryption) to collapse to deterministic zero outputs and hide “invalid key” errors by supplying a JWK whose modulus decodes to zero.
Exploit
Fix
Divide By Zero
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Jsrsasign