CVE-2026-22700 PUBLISHED

RustCrypto Has Insufficient Length Validation in decrypt() in SM2-PKE

Assigner: GitHub_M
Reserved: 08.01.2026 Published: 10.01.2026 Updated: 12.01.2026

RustCrypto: Elliptic Curves is general purpose Elliptic Curve Cryptography (ECC) support, including types and traits for representing various elliptic curve forms, scalars, points, and public/secret keys composed thereof. In versions 0.14.0-pre.0 and 0.14.0-rc.0, a denial-of-service vulnerability exists in the SM2 public-key encryption (PKE) implementation: the decrypt() path performs unchecked slice::split_at operations on input buffers derived from untrusted ciphertext. An attacker can submit short/undersized ciphertext or carefully-crafted DER-encoded structures to trigger bounds-check panics (Rust unwinding) which crash the calling thread or process. This issue has been patched via commit e60e991.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS Score: 7.5

Product Status

Vendor RustCrypto
Product elliptic-curves
Versions
  • Version = 0.14.0-pre.0 is affected
  • Version = 0.14.0-rc.0 is affected

References

Problem Types

  • CWE-20: Improper Input Validation CWE