Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
1 vulnerability by mkj
CVE-2026-3706 (GCVE-0-2026-3706)
Vulnerability from cvelistv5 – Published: 2026-03-08 05:02 – Updated: 2026-03-16 05:39 Disputed X_Open Source
VLAI?
Title
mkj Dropbear S Range Check curve25519.c unpackneg signature verification
Summary
A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The actual existence of this vulnerability is currently in question. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch. The project maintainer explains: "Signature Malleability is not exploitable in SSH protocol. (...) [A] PoC doesn't exist for SSH implementation, but rather it's against the internal API."
Severity ?
CWE
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| mkj | Dropbear |
Affected:
2025.0
Affected: 2025.1 Affected: 2025.2 Affected: 2025.3 Affected: 2025.4 Affected: 2025.5 Affected: 2025.6 Affected: 2025.7 Affected: 2025.8 Affected: 2025.9 Affected: 2025.10 Affected: 2025.11 Affected: 2025.12 Affected: 2025.13 Affected: 2025.14 Affected: 2025.15 Affected: 2025.16 Affected: 2025.17 Affected: 2025.18 Affected: 2025.19 Affected: 2025.20 Affected: 2025.21 Affected: 2025.22 Affected: 2025.23 Affected: 2025.24 Affected: 2025.25 Affected: 2025.26 Affected: 2025.27 Affected: 2025.28 Affected: 2025.29 Affected: 2025.30 Affected: 2025.31 Affected: 2025.32 Affected: 2025.33 Affected: 2025.34 Affected: 2025.35 Affected: 2025.36 Affected: 2025.37 Affected: 2025.38 Affected: 2025.39 Affected: 2025.40 Affected: 2025.41 Affected: 2025.42 Affected: 2025.43 Affected: 2025.44 Affected: 2025.45 Affected: 2025.46 Affected: 2025.47 Affected: 2025.48 Affected: 2025.49 Affected: 2025.50 Affected: 2025.51 Affected: 2025.52 Affected: 2025.53 Affected: 2025.54 Affected: 2025.55 Affected: 2025.56 Affected: 2025.57 Affected: 2025.58 Affected: 2025.59 Affected: 2025.60 Affected: 2025.61 Affected: 2025.62 Affected: 2025.63 Affected: 2025.64 Affected: 2025.65 Affected: 2025.66 Affected: 2025.67 Affected: 2025.68 Affected: 2025.69 Affected: 2025.70 Affected: 2025.71 Affected: 2025.72 Affected: 2025.73 Affected: 2025.74 Affected: 2025.75 Affected: 2025.76 Affected: 2025.77 Affected: 2025.78 Affected: 2025.79 Affected: 2025.80 Affected: 2025.81 Affected: 2025.82 Affected: 2025.83 Affected: 2025.84 Affected: 2025.85 Affected: 2025.86 Affected: 2025.87 Affected: 2025.88 Affected: 2025.89 |
Credits
pythok (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-3706",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-10T14:05:08.951683Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-10T14:06:36.950Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"S Range Check"
],
"product": "Dropbear",
"vendor": "mkj",
"versions": [
{
"status": "affected",
"version": "2025.0"
},
{
"status": "affected",
"version": "2025.1"
},
{
"status": "affected",
"version": "2025.2"
},
{
"status": "affected",
"version": "2025.3"
},
{
"status": "affected",
"version": "2025.4"
},
{
"status": "affected",
"version": "2025.5"
},
{
"status": "affected",
"version": "2025.6"
},
{
"status": "affected",
"version": "2025.7"
},
{
"status": "affected",
"version": "2025.8"
},
{
"status": "affected",
"version": "2025.9"
},
{
"status": "affected",
"version": "2025.10"
},
{
"status": "affected",
"version": "2025.11"
},
{
"status": "affected",
"version": "2025.12"
},
{
"status": "affected",
"version": "2025.13"
},
{
"status": "affected",
"version": "2025.14"
},
{
"status": "affected",
"version": "2025.15"
},
{
"status": "affected",
"version": "2025.16"
},
{
"status": "affected",
"version": "2025.17"
},
{
"status": "affected",
"version": "2025.18"
},
{
"status": "affected",
"version": "2025.19"
},
{
"status": "affected",
"version": "2025.20"
},
{
"status": "affected",
"version": "2025.21"
},
{
"status": "affected",
"version": "2025.22"
},
{
"status": "affected",
"version": "2025.23"
},
{
"status": "affected",
"version": "2025.24"
},
{
"status": "affected",
"version": "2025.25"
},
{
"status": "affected",
"version": "2025.26"
},
{
"status": "affected",
"version": "2025.27"
},
{
"status": "affected",
"version": "2025.28"
},
{
"status": "affected",
"version": "2025.29"
},
{
"status": "affected",
"version": "2025.30"
},
{
"status": "affected",
"version": "2025.31"
},
{
"status": "affected",
"version": "2025.32"
},
{
"status": "affected",
"version": "2025.33"
},
{
"status": "affected",
"version": "2025.34"
},
{
"status": "affected",
"version": "2025.35"
},
{
"status": "affected",
"version": "2025.36"
},
{
"status": "affected",
"version": "2025.37"
},
{
"status": "affected",
"version": "2025.38"
},
{
"status": "affected",
"version": "2025.39"
},
{
"status": "affected",
"version": "2025.40"
},
{
"status": "affected",
"version": "2025.41"
},
{
"status": "affected",
"version": "2025.42"
},
{
"status": "affected",
"version": "2025.43"
},
{
"status": "affected",
"version": "2025.44"
},
{
"status": "affected",
"version": "2025.45"
},
{
"status": "affected",
"version": "2025.46"
},
{
"status": "affected",
"version": "2025.47"
},
{
"status": "affected",
"version": "2025.48"
},
{
"status": "affected",
"version": "2025.49"
},
{
"status": "affected",
"version": "2025.50"
},
{
"status": "affected",
"version": "2025.51"
},
{
"status": "affected",
"version": "2025.52"
},
{
"status": "affected",
"version": "2025.53"
},
{
"status": "affected",
"version": "2025.54"
},
{
"status": "affected",
"version": "2025.55"
},
{
"status": "affected",
"version": "2025.56"
},
{
"status": "affected",
"version": "2025.57"
},
{
"status": "affected",
"version": "2025.58"
},
{
"status": "affected",
"version": "2025.59"
},
{
"status": "affected",
"version": "2025.60"
},
{
"status": "affected",
"version": "2025.61"
},
{
"status": "affected",
"version": "2025.62"
},
{
"status": "affected",
"version": "2025.63"
},
{
"status": "affected",
"version": "2025.64"
},
{
"status": "affected",
"version": "2025.65"
},
{
"status": "affected",
"version": "2025.66"
},
{
"status": "affected",
"version": "2025.67"
},
{
"status": "affected",
"version": "2025.68"
},
{
"status": "affected",
"version": "2025.69"
},
{
"status": "affected",
"version": "2025.70"
},
{
"status": "affected",
"version": "2025.71"
},
{
"status": "affected",
"version": "2025.72"
},
{
"status": "affected",
"version": "2025.73"
},
{
"status": "affected",
"version": "2025.74"
},
{
"status": "affected",
"version": "2025.75"
},
{
"status": "affected",
"version": "2025.76"
},
{
"status": "affected",
"version": "2025.77"
},
{
"status": "affected",
"version": "2025.78"
},
{
"status": "affected",
"version": "2025.79"
},
{
"status": "affected",
"version": "2025.80"
},
{
"status": "affected",
"version": "2025.81"
},
{
"status": "affected",
"version": "2025.82"
},
{
"status": "affected",
"version": "2025.83"
},
{
"status": "affected",
"version": "2025.84"
},
{
"status": "affected",
"version": "2025.85"
},
{
"status": "affected",
"version": "2025.86"
},
{
"status": "affected",
"version": "2025.87"
},
{
"status": "affected",
"version": "2025.88"
},
{
"status": "affected",
"version": "2025.89"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pythok (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The actual existence of this vulnerability is currently in question. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch. The project maintainer explains: \"Signature Malleability is not exploitable in SSH protocol. (...) [A] PoC doesn\u0027t exist for SSH implementation, but rather it\u0027s against the internal API.\""
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 2.6,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-347",
"description": "Improper Verification of Cryptographic Signature",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-345",
"description": "Insufficient Verification of Data Authenticity",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-16T05:39:00.731Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-349652 | mkj Dropbear S Range Check curve25519.c unpackneg signature verification",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.349652"
},
{
"name": "VDB-349652 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.349652"
},
{
"name": "Submit #765933 | GitHub Dropbear 2025.89 Improper Verification of Cryptographic Signature",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.765933"
},
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/mkj/dropbear/issues/406"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/mkj/dropbear/pull/407"
},
{
"tags": [
"patch"
],
"url": "https://github.com/mkj/dropbear/commit/fdec3c90a15447bd538641d85e5a3e3ac981011d"
},
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/str4d/ed25519-java/issues/82#issue-727629226"
},
{
"tags": [
"product"
],
"url": "https://github.com/mkj/dropbear/"
}
],
"tags": [
"disputed",
"x_open-source"
],
"timeline": [
{
"lang": "en",
"time": "2026-03-07T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2026-03-07T01:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2026-03-16T06:42:50.000Z",
"value": "VulDB entry last update"
}
],
"title": "mkj Dropbear S Range Check curve25519.c unpackneg signature verification"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2026-3706",
"datePublished": "2026-03-08T05:02:11.136Z",
"dateReserved": "2026-03-07T09:05:33.842Z",
"dateUpdated": "2026-03-16T05:39:00.731Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}