Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-14505

CVE-2025-14505: Elliptic ECDSA Signature Vulnerability

CVE-2025-14505 is a cryptographic signature flaw in the Elliptic package's ECDSA implementation that can lead to secret key exposure. This article covers the technical details, affected versions, and mitigation strategies.

Updated: January 22, 2026

CVE-2025-14505 Overview

A cryptographic vulnerability has been identified in the ECDSA implementation of the Elliptic JavaScript package. The flaw generates incorrect signatures when an interim value of 'k' (computed per step 3.2 of RFC 6979) contains leading zeros. This occurs because the byte-length of 'k' is incorrectly computed, resulting in truncation during signature generation. The vulnerability breaks legitimate transactions and communications, and under certain conditions, attackers who obtain both a faulty signature from a vulnerable version and a correct signature for the same inputs could derive the secret key through cryptanalysis.

Critical Impact

Secret key exposure through cryptanalysis of faulty ECDSA signatures, potentially compromising cryptographic authentication and integrity across applications using the Elliptic package.

Affected Products

  • Elliptic npm package versions ≤ 6.6.1
  • All known versions of the Elliptic package at the time of disclosure
  • Applications and services utilizing the Elliptic library for ECDSA signature operations

Discovery Timeline

  • 2026-01-08 - CVE-2025-14505 published to NVD
  • 2026-01-08 - Last updated in NVD database

Technical Details for CVE-2025-14505

Vulnerability Analysis

This vulnerability stems from an implementation error in the ECDSA signature generation process within the Elliptic package. According to RFC 6979, deterministic ECDSA requires proper computation of the nonce value 'k' to ensure signature security. When 'k' values contain leading zero bytes, the Elliptic library incorrectly calculates the byte-length, causing the value to be truncated.

The truncation of 'k' results in mathematically incorrect signatures that may still appear valid in certain contexts but expose critical information about the private key. This is classified under CWE-1240 (Use of a Cryptographic Primitive with a Risky Implementation), as the core cryptographic algorithm is sound but the implementation introduces a fatal flaw.

The attack requires network access but involves high complexity, as the attacker must obtain both a faulty signature generated by the vulnerable implementation and a correct signature for identical inputs. This dual-signature requirement limits opportunistic exploitation but creates significant risk in environments where signature pairs may be observable.

Root Cause

The root cause lies in the incorrect byte-length calculation of the interim value 'k' during ECDSA signature generation. When 'k' has leading zeros, the library's length computation fails to account for these bytes properly, leading to truncation. This violates the mathematical requirements of RFC 6979 Section 3.2, where the full bit-length of 'k' must be preserved for secure signature generation.

The Elliptic package processes the deterministic nonce generation but introduces a subtle byte-handling error that manifests only when specific 'k' values with leading zeros are generated. This edge case in the number representation causes the signature to be computed with an incorrect nonce, fundamentally breaking the security guarantees of ECDSA.

Attack Vector

The attack vector is network-based, requiring the attacker to collect cryptographic signatures from the vulnerable system. The exploitation scenario involves:

  1. Signature Collection: The attacker monitors or intercepts ECDSA signatures generated by the vulnerable Elliptic implementation
  2. Fault Detection: Identifying signatures generated when 'k' contained leading zeros (resulting in faulty signatures)
  3. Comparative Analysis: Obtaining a correct signature for the same message-key pair from a patched version or alternative implementation
  4. Cryptanalysis: Using the mathematical relationship between the faulty and correct signatures to derive the secret key

The vulnerability mechanism relates to the ECDSA equation where the signature component s = k^(-1) * (z + r*d) mod n. When 'k' is incorrectly truncated, the resulting signature leaks information about the relationship between 'k' and the secret key 'd'. With access to both faulty and correct signatures, attackers can solve for the private key.

For technical details, refer to the GitHub Issue #321 Discussion and the HeroDevs vulnerability advisory.

Detection Methods for CVE-2025-14505

Indicators of Compromise

  • Signature verification failures for legitimate transactions or communications that previously succeeded
  • Inconsistent ECDSA signatures for identical inputs across different time periods
  • Reports of authentication or integrity check failures in systems using Elliptic for cryptographic operations
  • Unexpected signature lengths or malformed cryptographic outputs in application logs

Detection Strategies

  • Audit npm dependencies for Elliptic package versions ≤ 6.6.1 using npm audit or similar dependency scanning tools
  • Implement signature verification testing with known test vectors that include edge cases with leading zeros in 'k'
  • Monitor cryptographic operation logs for signature generation anomalies or verification failures
  • Deploy software composition analysis (SCA) tools to identify vulnerable Elliptic versions across the codebase

Monitoring Recommendations

  • Enable detailed logging for all ECDSA signature operations in production environments
  • Set up alerts for signature verification failures that may indicate exploitation attempts or faulty signatures
  • Monitor network traffic for patterns consistent with signature collection attacks
  • Implement runtime integrity checks for cryptographic operations using the Elliptic library

How to Mitigate CVE-2025-14505

Immediate Actions Required

  • Inventory all applications and services using the Elliptic npm package
  • Assess exposure by identifying systems performing ECDSA signature generation with affected versions
  • Consider rotating cryptographic keys for systems that may have generated faulty signatures with vulnerable versions
  • Evaluate the potential for key compromise in high-security environments where signature pairs may have been exposed

Patch Information

At the time of CVE publication, all known versions of the Elliptic package (≤ 6.6.1) are affected. Organizations should monitor the official GitHub repository for patch releases addressing this vulnerability. Once a patched version is available, update immediately using:

bash
npm update elliptic

After patching, regenerate and re-sign any cryptographic material that may have been compromised. Consider key rotation as a precautionary measure for sensitive systems.

Workarounds

  • Implement additional signature validation layers that verify signature correctness before transmission
  • Consider using alternative ECDSA implementations temporarily while awaiting a patch
  • Add application-level checks to detect and reject signatures that may be malformed due to 'k' truncation
  • Isolate systems using Elliptic from networks where signature collection attacks are feasible
bash
# Check for vulnerable Elliptic versions in your project
npm list elliptic
npm audit --audit-level=moderate

# Monitor for package updates
npm outdated elliptic

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechElliptic

  • SeverityMEDIUM

  • CVSS Score5.6

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-1240
  • Technical References
  • GitHub Issue #321 Discussion

  • HeroDevs CVE-2025-14505 Vulnerability
  • Related CVEs
  • CVE-2024-48949: Indutny Elliptic Signature Vulnerability

  • CVE-2024-42461: Elliptic ECDSA Signature Malleability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English