CVE-2026-4541
Received Received - Intake
Improper Signature Verification in TinySSH Ed25519 Handler

Publication date: 2026-03-22

Last updated on: 2026-04-29

Assigner: VulDB

Description
A flaw has been found in janmojzis tinyssh up to 20250501. Impacted is an unknown function of the file tinyssh/crypto_sign_ed25519_tinyssh.c of the component Ed25519 Signature Handler. This manipulation causes improper verification of cryptographic signature. The attack is restricted to local execution. The attack's complexity is rated as high. The exploitability is considered difficult. The exploit has been published and may be used. Upgrading to version 20260301 is recommended to address this issue. Patch name: 9c87269607e0d7d20174df742accc49c042cff17. Upgrading the affected component is recommended.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-22
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
janmojzis tinyssh to 20250501 (inc)
janmojzis tinyssh 20260301
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-345 The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
CWE-347 The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Ed25519 signature verification function of the tinyssh project, specifically in the file tinyssh/crypto_sign_ed25519_tinyssh.c. The flaw is that the verifier does not properly check that the scalar component S of a signature is less than the subgroup order L, as required by the Ed25519 specification (RFC 8032 Β§5.1.7). Without this check, signatures can be malleated by adding the subgroup order L to S, creating different signatures that are still accepted as valid by tinyssh.

This signature malleability breaks signature uniqueness and can cause inconsistencies across different implementations that enforce strict canonical checks. The vulnerability is exploitable only locally and is considered difficult to exploit, but an exploit has been published.

The issue was fixed by adding a validation step that rejects any signatures where S is greater than or equal to L, ensuring strict subgroup order checks and preventing acceptance of malleable signatures.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker with local access to create malleable Ed25519 signatures that are accepted as valid by tinyssh, even though they differ from the original signature. This breaks the uniqueness property of signatures.

Such malleability can lead to inconsistencies in signature verification across different systems or implementations, potentially undermining trust in cryptographic authentication and audit mechanisms that rely on unique, canonical signatures.

While the attack complexity is high and exploitability is difficult, the presence of a published exploit means that attackers could potentially leverage this flaw to bypass certain cryptographic checks or cause confusion in signature validation processes.

Upgrading to the fixed version 20260301 of tinyssh is recommended to mitigate this risk.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is related to improper verification of Ed25519 cryptographic signatures within the tinyssh server, specifically allowing signature malleability due to missing checks on the scalar component S of the signature.

Detection involves verifying whether the tinyssh version in use includes the fix that rejects signatures with scalar S values greater than or equal to the Ed25519 subgroup order L.

Since the vulnerability is local and related to signature verification logic, direct network detection commands are not straightforward. However, you can check the installed tinyssh version to determine if it is vulnerable.

  • Check tinyssh version installed: `tinyssh -v` or check package version via your package manager.
  • Verify if the version is older than 20260301, which contains the fix.

For more technical detection, you could attempt to use a proof-of-concept malleated Ed25519 signature (S + L) against your tinyssh server to see if it accepts such signatures, indicating vulnerability. This requires custom scripts or tools that generate and test Ed25519 signatures with manipulated scalar values.


What immediate steps should I take to mitigate this vulnerability?

The primary and recommended mitigation step is to upgrade tinyssh to version 20260301 or later, which includes the patch that properly rejects signatures with scalar S values greater than or equal to the Ed25519 subgroup order L.

This update enforces strict subgroup order checks during signature verification, preventing signature malleability and improving cryptographic robustness.

  • Download and install tinyssh version 20260301 or newer.
  • Apply the patch identified by commit 9c87269607e0d7d20174df742accc49c042cff17 if upgrading is not immediately possible.

Since the attack complexity is high and exploitability is difficult and local, limiting local access to the system and monitoring for suspicious local activity can also help reduce risk until the patch is applied.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart