CVE-2026-24801
Unknown Unknown - Not Provided
ECC DSA Vulnerability in Ralim IronOS BLE Stack Before v2.23-rc

Publication date: 2026-01-27

Last updated on: 2026-03-03

Assigner: Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)

Description
Vulnerability in Ralim IronOS (source/Core/BSP/Pinecilv2/bl_mcu_sdk/components/ble/ble_stack/common/tinycrypt/source modules). This vulnerability is associated with program files ecc_dsa.C. This issue affects IronOS: before v2.23-rc3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-27
Last Modified
2026-03-03
Generated
2026-05-07
AI Q&A
2026-01-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ralim ironos to 2.23-rc3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the IronOS project's cryptographic signing function `uECC_sign_with_k()`, which was cloned from the micro-ecc library but lacked a critical security patch present in the original micro-ecc code. The issue is in the `ecc_dsa.c` file and could allow exploitation due to insecure handling in the signing process. A security patch from micro-ecc was applied to IronOS to fix this, ensuring the cryptographic function is secure and aligned with the original library's standards. [1]


How can this vulnerability impact me? :

The vulnerability could allow attackers to exploit weaknesses in the cryptographic signing function, potentially compromising the integrity and authenticity of signed data or communications within IronOS devices. This could lead to unauthorized actions or data manipulation if exploited. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is in the IronOS software before version v2.23-rc3, specifically in the ecc_dsa.c file related to the uECC_sign_with_k() function. Detection would involve checking the version of IronOS running on your device to see if it is before v2.23-rc3. There are no specific network detection commands provided in the resources. To detect the vulnerable version, you can check the firmware version on your device. For example, if you have command line access to the device, you might use commands to query the firmware version or inspect the file ecc_dsa.c if source access is available. However, no explicit commands for detection are provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update IronOS to version v2.23-rc3 or later, where the vulnerability in ecc_dsa.c has been fixed by applying the security patch from the original micro-ecc library. This patch corrects the uECC_sign_with_k() function to prevent exploitation. If updating is not immediately possible, consider restricting access to devices running vulnerable versions and monitor for suspicious activity related to cryptographic signing operations. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart