CVE-2026-4603

ADVISORY - github

Summary

Versions of the package jsrsasign before 11.1.1 are vulnerable to Division by zero due to the RSASetPublic/KEYUTIL parsing path in ext/rsa.js and the BigInteger.modPowInt reduction logic in ext/jsbn.js. An attacker can force RSA public-key operations (e.g., verify and encryption) to collapse to deterministic zero outputs and hide “invalid key” errors by supplying a JWK whose modulus decodes to zero.

EPSS Score: 0.00009 (0.010)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Divide By Zero

ADVISORY - github

Divide By Zero

ADVISORY - redhat

Divide By Zero


NIST

CREATED

UPDATED

ADVISORY IDCVE-2026-4603
EXPLOITABILITY SCORE

2.5

EXPLOITS FOUND
COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

5.1medium

GitHub

CREATED

UPDATED

EXPLOITABILITY SCORE

2.5

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

2low

Red Hat

CREATED

UPDATED

ADVISORY IDCVE-2026-4603
EXPLOITABILITY SCORE

2.5

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

5.9medium