CVE-2026-23966
Unknown Unknown - Not Provided
Private Key Recovery in sm-crypto SM2 Decryption Vulnerability

Publication date: 2026-01-22

Last updated on: 2026-02-25

Assigner: GitHub, Inc.

Description
sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A private key recovery vulnerability exists in the SM2 decryption logic of sm-crypto prior to version 0.3.14. By interacting with the SM2 decryption interface multiple times, an attacker can fully recover the private key within approximately several hundred interactions. Version 0.3.14 patches the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-22
Last Modified
2026-02-25
Generated
2026-05-07
AI Q&A
2026-01-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
juneandgreen sm-crypto to 0.3.14 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-345 The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-23966 is a critical vulnerability in the SM2 decryption logic of the sm-crypto JavaScript library (versions prior to 0.3.14). Due to insufficient verification of data authenticity during decryption, an attacker can interact multiple times with the SM2 decryption interface and fully recover the private key after approximately several hundred interactions. This flaw allows remote exploitation without any privileges or user interaction. [1]


How can this vulnerability impact me? :

This vulnerability can lead to a complete compromise of the private key used in SM2 encryption, allowing an attacker to decrypt sensitive data, impersonate the key owner, and compromise the confidentiality and integrity of communications or data protected by the affected sm-crypto library. The attack requires no privileges and can be performed remotely with low complexity, making it highly dangerous. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking the version of the sm-crypto library in use. Versions prior to 0.3.14 are vulnerable. There are no specific network detection commands provided, but verifying the library version in your environment is essential. Additionally, monitoring for unusual or repeated interactions with the SM2 decryption interface could indicate exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to upgrade the sm-crypto library to version 0.3.14 or later, which includes patches that add validation checks to prevent private key recovery attacks. These patches validate elliptic curve points and public keys during decryption and signature verification, aborting processing if invalid data is detected. [1, 2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows an attacker to fully recover the private key used in SM2 decryption, which compromises the confidentiality and integrity of encrypted data. Such a compromise can lead to unauthorized data access and breaches, potentially violating data protection requirements under standards like GDPR and HIPAA that mandate strong cryptographic protections to safeguard sensitive information. Therefore, the vulnerability negatively impacts compliance with these regulations by undermining the security guarantees expected from cryptographic implementations. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart