CVE-2026-23965
Multiple · Multiple products utilizing the sm-crypto JavaScript library.
A high-severity vulnerability has been identified in the sm-crypto JavaScript library, a component used by multiple products to implement Chinese cryptographic standards.
Executive summary
A high-severity vulnerability has been identified in the sm-crypto JavaScript library, a component used by multiple products to implement Chinese cryptographic standards. This flaw could allow a remote attacker to compromise cryptographic operations, potentially leading to the decryption of sensitive information or the forgery of digital signatures. Organizations utilizing affected software are exposed to risks of data breaches, integrity loss, and system compromise.
Vulnerability
The vulnerability exists within the implementation of the SM2 asymmetric encryption algorithm in the sm-crypto library. Specifically, the library is susceptible to a timing side-channel attack during the private key decryption process. By sending specially crafted ciphertexts and precisely measuring the server's response times, a remote, unauthenticated attacker can iteratively deduce bits of the private key. A successful exploitation would allow the attacker to fully reconstruct the private key, enabling them to decrypt all information encrypted with the corresponding public key and forge digital signatures on behalf of the key's legitimate owner.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Exploitation could have a significant business impact, including the breach of confidential data such as personally identifiable information (PII), financial records, or intellectual property protected by the SM2 algorithm. The ability to forge digital signatures could lead to unauthorized transactions, contract repudiation, and a complete loss of trust in the affected systems. The potential consequences include severe reputational damage, financial loss, and possible regulatory penalties for non-compliance with data protection standards.
Remediation
Immediate Action:
- Identify all applications and systems that use the vulnerable sm-crypto library.
- Apply the security updates provided by the respective software vendors immediately to mitigate this vulnerability.
- If a patch is not yet available, prioritize isolating the affected systems from untrusted networks.
Proactive Monitoring:
- Monitor application and server logs for anomalous patterns, such as an unusually high rate of decryption errors or repeated connections from a single source targeting cryptographic endpoints.
- Analyze network traffic for repeated, small variations in requests to services that utilize the sm-crypto library, which may indicate an attacker's attempt to perform a timing attack.
- Implement alerts for unusual CPU usage on affected systems, as exploitation attempts may cause a noticeable performance signature.
Compensating Controls:
- If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules to rate-limit or block requests that show patterns consistent with a timing attack.
- Enforce strict network segmentation to limit access to the vulnerable components from the internet and other non-essential internal network zones.
- Consider adding an additional layer of encryption using an unaffected cryptographic library for critical data in transit and at rest.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the High severity (CVSS 7.5) of this vulnerability and its potential impact on data confidentiality and integrity, we strongly recommend that organizations take immediate action. The primary course of action is to identify all assets using the sm-crypto library and apply the necessary vendor patches on a priority basis, starting with internet-facing and critical systems. Although this CVE is not currently listed on the CISA KEV list, its severity warrants an urgent response to prevent potential exploitation and protect sensitive organizational data.