CVE-2026-23967

Multiple · Multiple Products utilizing the sm-crypto JavaScript library

A high-severity vulnerability has been identified in the sm-crypto JavaScript library, a component used for Chinese cryptographic standards.

Executive summary

A high-severity vulnerability has been identified in the sm-crypto JavaScript library, a component used for Chinese cryptographic standards. This flaw could allow a remote attacker to deduce sensitive private keys by analyzing the time it takes for cryptographic operations to execute. Successful exploitation could lead to the complete compromise of encrypted data and digital signatures, enabling data theft, impersonation, and other malicious activities.

Vulnerability

The vulnerability is a timing side-channel attack within the SM2 algorithm implementation of the sm-crypto library. The amount of time the software takes to perform cryptographic computations, such as digital signing or decryption, varies depending on the bits of the private key being used. A remote attacker can send a large number of specially crafted requests to a service using the vulnerable library and precisely measure the response times. By analyzing these timing variations, the attacker can incrementally reconstruct the server's private key, bit by bit, leading to a full key compromise without needing prior access to the system.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.5, reflecting the critical risk of private key compromise. The business impact is severe, as the exposure of a private key would nullify the security assurances provided by encryption. An attacker in possession of a private key could decrypt sensitive historical and future communications, forge digital signatures to authorize fraudulent transactions or impersonate the organization, and undermine the integrity of secure channels. This could result in significant financial loss, regulatory penalties, reputational damage, and a complete loss of customer trust.

Remediation

Immediate Action: Organizations must immediately identify all applications and systems that utilize the vulnerable sm-crypto library and apply the security updates provided by the respective software vendors. Following patching, it is critical to monitor for any unusual or repeated connection attempts to cryptographic endpoints and carefully review system and application access logs for signs of compromise.

Proactive Monitoring: Security teams should monitor for an abnormally high rate of cryptographic operations originating from a single IP address or user agent, as this may indicate a brute-force timing attack. Scrutinize network traffic for connections with unusual timing patterns or durations. System performance monitoring, specifically CPU utilization on servers performing SM2 operations, may also reveal the computational stress indicative of an ongoing attack.

Compensating Controls: If patching is not immediately feasible, organizations should consider implementing rate-limiting on API endpoints that trigger SM2 operations to slow down an attacker's ability to gather timing data. A Web Application Firewall (WAF) can be configured to block IPs that exhibit aggressive scanning or request patterns. As a temporary measure, introducing random delays (blinding) into the cryptographic process at the application layer can help obfuscate the timing side-channel, though this is less effective than applying the official patch.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity of this vulnerability and its potential to completely undermine cryptographic security, we recommend that organizations treat this as a critical priority. All teams should immediately begin discovery efforts to identify instances of the sm-crypto library within their environment and apply vendor-supplied patches without delay. Although this CVE is not currently on the CISA KEV list, the fundamental risk of private key exposure warrants an urgent and proactive response to prevent potential future exploitation.