CVE-2026-3706 (GCVE-0-2026-3706)

Vulnerability from cvelistv5 – Published: 2026-03-08 05:02 – Updated: 2026-03-16 05:39 Disputed X_Open Source
VLAI?
Title
mkj Dropbear S Range Check curve25519.c unpackneg signature verification
Summary
A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The actual existence of this vulnerability is currently in question. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch. The project maintainer explains: "Signature Malleability is not exploitable in SSH protocol. (...) [A] PoC doesn't exist for SSH implementation, but rather it's against the internal API."
CWE
  • CWE-347 - Improper Verification of Cryptographic Signature
  • CWE-345 - Insufficient Verification of Data Authenticity
Assigner
Impacted products
Vendor Product Version
mkj Dropbear Affected: 2025.0
Affected: 2025.1
Affected: 2025.2
Affected: 2025.3
Affected: 2025.4
Affected: 2025.5
Affected: 2025.6
Affected: 2025.7
Affected: 2025.8
Affected: 2025.9
Affected: 2025.10
Affected: 2025.11
Affected: 2025.12
Affected: 2025.13
Affected: 2025.14
Affected: 2025.15
Affected: 2025.16
Affected: 2025.17
Affected: 2025.18
Affected: 2025.19
Affected: 2025.20
Affected: 2025.21
Affected: 2025.22
Affected: 2025.23
Affected: 2025.24
Affected: 2025.25
Affected: 2025.26
Affected: 2025.27
Affected: 2025.28
Affected: 2025.29
Affected: 2025.30
Affected: 2025.31
Affected: 2025.32
Affected: 2025.33
Affected: 2025.34
Affected: 2025.35
Affected: 2025.36
Affected: 2025.37
Affected: 2025.38
Affected: 2025.39
Affected: 2025.40
Affected: 2025.41
Affected: 2025.42
Affected: 2025.43
Affected: 2025.44
Affected: 2025.45
Affected: 2025.46
Affected: 2025.47
Affected: 2025.48
Affected: 2025.49
Affected: 2025.50
Affected: 2025.51
Affected: 2025.52
Affected: 2025.53
Affected: 2025.54
Affected: 2025.55
Affected: 2025.56
Affected: 2025.57
Affected: 2025.58
Affected: 2025.59
Affected: 2025.60
Affected: 2025.61
Affected: 2025.62
Affected: 2025.63
Affected: 2025.64
Affected: 2025.65
Affected: 2025.66
Affected: 2025.67
Affected: 2025.68
Affected: 2025.69
Affected: 2025.70
Affected: 2025.71
Affected: 2025.72
Affected: 2025.73
Affected: 2025.74
Affected: 2025.75
Affected: 2025.76
Affected: 2025.77
Affected: 2025.78
Affected: 2025.79
Affected: 2025.80
Affected: 2025.81
Affected: 2025.82
Affected: 2025.83
Affected: 2025.84
Affected: 2025.85
Affected: 2025.86
Affected: 2025.87
Affected: 2025.88
Affected: 2025.89
Create a notification for this product.
Credits
pythok (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-3706",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-10T14:05:08.951683Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-10T14:06:36.950Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "S Range Check"
          ],
          "product": "Dropbear",
          "vendor": "mkj",
          "versions": [
            {
              "status": "affected",
              "version": "2025.0"
            },
            {
              "status": "affected",
              "version": "2025.1"
            },
            {
              "status": "affected",
              "version": "2025.2"
            },
            {
              "status": "affected",
              "version": "2025.3"
            },
            {
              "status": "affected",
              "version": "2025.4"
            },
            {
              "status": "affected",
              "version": "2025.5"
            },
            {
              "status": "affected",
              "version": "2025.6"
            },
            {
              "status": "affected",
              "version": "2025.7"
            },
            {
              "status": "affected",
              "version": "2025.8"
            },
            {
              "status": "affected",
              "version": "2025.9"
            },
            {
              "status": "affected",
              "version": "2025.10"
            },
            {
              "status": "affected",
              "version": "2025.11"
            },
            {
              "status": "affected",
              "version": "2025.12"
            },
            {
              "status": "affected",
              "version": "2025.13"
            },
            {
              "status": "affected",
              "version": "2025.14"
            },
            {
              "status": "affected",
              "version": "2025.15"
            },
            {
              "status": "affected",
              "version": "2025.16"
            },
            {
              "status": "affected",
              "version": "2025.17"
            },
            {
              "status": "affected",
              "version": "2025.18"
            },
            {
              "status": "affected",
              "version": "2025.19"
            },
            {
              "status": "affected",
              "version": "2025.20"
            },
            {
              "status": "affected",
              "version": "2025.21"
            },
            {
              "status": "affected",
              "version": "2025.22"
            },
            {
              "status": "affected",
              "version": "2025.23"
            },
            {
              "status": "affected",
              "version": "2025.24"
            },
            {
              "status": "affected",
              "version": "2025.25"
            },
            {
              "status": "affected",
              "version": "2025.26"
            },
            {
              "status": "affected",
              "version": "2025.27"
            },
            {
              "status": "affected",
              "version": "2025.28"
            },
            {
              "status": "affected",
              "version": "2025.29"
            },
            {
              "status": "affected",
              "version": "2025.30"
            },
            {
              "status": "affected",
              "version": "2025.31"
            },
            {
              "status": "affected",
              "version": "2025.32"
            },
            {
              "status": "affected",
              "version": "2025.33"
            },
            {
              "status": "affected",
              "version": "2025.34"
            },
            {
              "status": "affected",
              "version": "2025.35"
            },
            {
              "status": "affected",
              "version": "2025.36"
            },
            {
              "status": "affected",
              "version": "2025.37"
            },
            {
              "status": "affected",
              "version": "2025.38"
            },
            {
              "status": "affected",
              "version": "2025.39"
            },
            {
              "status": "affected",
              "version": "2025.40"
            },
            {
              "status": "affected",
              "version": "2025.41"
            },
            {
              "status": "affected",
              "version": "2025.42"
            },
            {
              "status": "affected",
              "version": "2025.43"
            },
            {
              "status": "affected",
              "version": "2025.44"
            },
            {
              "status": "affected",
              "version": "2025.45"
            },
            {
              "status": "affected",
              "version": "2025.46"
            },
            {
              "status": "affected",
              "version": "2025.47"
            },
            {
              "status": "affected",
              "version": "2025.48"
            },
            {
              "status": "affected",
              "version": "2025.49"
            },
            {
              "status": "affected",
              "version": "2025.50"
            },
            {
              "status": "affected",
              "version": "2025.51"
            },
            {
              "status": "affected",
              "version": "2025.52"
            },
            {
              "status": "affected",
              "version": "2025.53"
            },
            {
              "status": "affected",
              "version": "2025.54"
            },
            {
              "status": "affected",
              "version": "2025.55"
            },
            {
              "status": "affected",
              "version": "2025.56"
            },
            {
              "status": "affected",
              "version": "2025.57"
            },
            {
              "status": "affected",
              "version": "2025.58"
            },
            {
              "status": "affected",
              "version": "2025.59"
            },
            {
              "status": "affected",
              "version": "2025.60"
            },
            {
              "status": "affected",
              "version": "2025.61"
            },
            {
              "status": "affected",
              "version": "2025.62"
            },
            {
              "status": "affected",
              "version": "2025.63"
            },
            {
              "status": "affected",
              "version": "2025.64"
            },
            {
              "status": "affected",
              "version": "2025.65"
            },
            {
              "status": "affected",
              "version": "2025.66"
            },
            {
              "status": "affected",
              "version": "2025.67"
            },
            {
              "status": "affected",
              "version": "2025.68"
            },
            {
              "status": "affected",
              "version": "2025.69"
            },
            {
              "status": "affected",
              "version": "2025.70"
            },
            {
              "status": "affected",
              "version": "2025.71"
            },
            {
              "status": "affected",
              "version": "2025.72"
            },
            {
              "status": "affected",
              "version": "2025.73"
            },
            {
              "status": "affected",
              "version": "2025.74"
            },
            {
              "status": "affected",
              "version": "2025.75"
            },
            {
              "status": "affected",
              "version": "2025.76"
            },
            {
              "status": "affected",
              "version": "2025.77"
            },
            {
              "status": "affected",
              "version": "2025.78"
            },
            {
              "status": "affected",
              "version": "2025.79"
            },
            {
              "status": "affected",
              "version": "2025.80"
            },
            {
              "status": "affected",
              "version": "2025.81"
            },
            {
              "status": "affected",
              "version": "2025.82"
            },
            {
              "status": "affected",
              "version": "2025.83"
            },
            {
              "status": "affected",
              "version": "2025.84"
            },
            {
              "status": "affected",
              "version": "2025.85"
            },
            {
              "status": "affected",
              "version": "2025.86"
            },
            {
              "status": "affected",
              "version": "2025.87"
            },
            {
              "status": "affected",
              "version": "2025.88"
            },
            {
              "status": "affected",
              "version": "2025.89"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "pythok (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The actual existence of this vulnerability is currently in question. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch. The project maintainer explains: \"Signature Malleability is not exploitable in SSH protocol. (...) [A] PoC doesn\u0027t exist for SSH implementation, but rather it\u0027s against the internal API.\""
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 2.6,
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-347",
              "description": "Improper Verification of Cryptographic Signature",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-345",
              "description": "Insufficient Verification of Data Authenticity",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-16T05:39:00.731Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-349652 | mkj Dropbear S Range Check curve25519.c unpackneg signature verification",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.349652"
        },
        {
          "name": "VDB-349652 | CTI Indicators (IOB, IOC, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.349652"
        },
        {
          "name": "Submit #765933 | GitHub Dropbear 2025.89 Improper Verification of Cryptographic Signature",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.765933"
        },
        {
          "tags": [
            "issue-tracking"
          ],
          "url": "https://github.com/mkj/dropbear/issues/406"
        },
        {
          "tags": [
            "issue-tracking",
            "patch"
          ],
          "url": "https://github.com/mkj/dropbear/pull/407"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/mkj/dropbear/commit/fdec3c90a15447bd538641d85e5a3e3ac981011d"
        },
        {
          "tags": [
            "issue-tracking"
          ],
          "url": "https://github.com/str4d/ed25519-java/issues/82#issue-727629226"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://github.com/mkj/dropbear/"
        }
      ],
      "tags": [
        "disputed",
        "x_open-source"
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2026-03-07T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2026-03-07T01:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2026-03-16T06:42:50.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "mkj Dropbear S Range Check curve25519.c unpackneg signature verification"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2026-3706",
    "datePublished": "2026-03-08T05:02:11.136Z",
    "dateReserved": "2026-03-07T09:05:33.842Z",
    "dateUpdated": "2026-03-16T05:39:00.731Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2026-3706",
      "date": "2026-04-18",
      "epss": "0.0001",
      "percentile": "0.0108"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-3706\",\"sourceIdentifier\":\"cna@vuldb.com\",\"published\":\"2026-03-08T05:16:31.847\",\"lastModified\":\"2026-03-16T14:19:52.480\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[{\"sourceIdentifier\":\"cna@vuldb.com\",\"tags\":[\"disputed\"]}],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The actual existence of this vulnerability is currently in question. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch. The project maintainer explains: \\\"Signature Malleability is not exploitable in SSH protocol. (...) [A] PoC doesn\u0027t exist for SSH implementation, but rather it\u0027s against the internal API.\\\"\"},{\"lang\":\"es\",\"value\":\"Se determin\u00f3 una vulnerabilidad en mkj Dropbear hasta 2025.89. La funci\u00f3n unpackneg del archivo src/curve25519.c del componente S Range Check se ve afectada. Esta manipulaci\u00f3n provoca una verificaci\u00f3n incorrecta de la firma criptogr\u00e1fica. El ataque puede iniciarse de forma remota. Se considera que el ataque tiene una complejidad alta. La explotabilidad se considera dif\u00edcil. El exploit ha sido divulgado p\u00fablicamente y puede ser utilizado. Nombre del parche: fdec3c90a15447bd538641d85e5a3e3ac981011d. Para solucionar este problema, se recomienda desplegar un parche.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":1.7,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"UNREPORTED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":3.7,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:N/I:P/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-345\"},{\"lang\":\"en\",\"value\":\"CWE-347\"}]}],\"references\":[{\"url\":\"https://github.com/mkj/dropbear/\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://github.com/mkj/dropbear/commit/fdec3c90a15447bd538641d85e5a3e3ac981011d\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://github.com/mkj/dropbear/issues/406\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://github.com/mkj/dropbear/pull/407\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://github.com/str4d/ed25519-java/issues/82#issue-727629226\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://vuldb.com/?ctiid.349652\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://vuldb.com/?id.349652\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://vuldb.com/?submit.765933\",\"source\":\"cna@vuldb.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-3706\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-10T14:05:08.951683Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-10T14:06:32.527Z\"}}], \"cna\": {\"tags\": [\"disputed\", \"x_open-source\"], \"title\": \"mkj Dropbear S Range Check curve25519.c unpackneg signature verification\", \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"pythok (VulDB User)\"}], \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 6.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U\"}}, {\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 3.7, \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C\"}}, {\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 3.7, \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C\"}}, {\"cvssV2_0\": {\"version\": \"2.0\", \"baseScore\": 2.6, \"vectorString\": \"AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C\"}}], \"affected\": [{\"vendor\": \"mkj\", \"modules\": [\"S Range Check\"], \"product\": \"Dropbear\", \"versions\": [{\"status\": \"affected\", \"version\": \"2025.0\"}, {\"status\": \"affected\", \"version\": \"2025.1\"}, {\"status\": \"affected\", \"version\": \"2025.2\"}, {\"status\": \"affected\", \"version\": \"2025.3\"}, {\"status\": \"affected\", \"version\": \"2025.4\"}, {\"status\": \"affected\", \"version\": \"2025.5\"}, {\"status\": \"affected\", \"version\": \"2025.6\"}, {\"status\": \"affected\", \"version\": \"2025.7\"}, {\"status\": \"affected\", \"version\": \"2025.8\"}, {\"status\": \"affected\", \"version\": \"2025.9\"}, {\"status\": \"affected\", \"version\": \"2025.10\"}, {\"status\": \"affected\", \"version\": \"2025.11\"}, {\"status\": \"affected\", \"version\": \"2025.12\"}, {\"status\": \"affected\", \"version\": \"2025.13\"}, {\"status\": \"affected\", \"version\": \"2025.14\"}, {\"status\": \"affected\", \"version\": \"2025.15\"}, {\"status\": \"affected\", \"version\": \"2025.16\"}, {\"status\": \"affected\", \"version\": \"2025.17\"}, {\"status\": \"affected\", \"version\": \"2025.18\"}, {\"status\": \"affected\", \"version\": \"2025.19\"}, {\"status\": \"affected\", \"version\": \"2025.20\"}, {\"status\": \"affected\", \"version\": \"2025.21\"}, {\"status\": \"affected\", \"version\": \"2025.22\"}, {\"status\": \"affected\", \"version\": \"2025.23\"}, {\"status\": \"affected\", \"version\": \"2025.24\"}, {\"status\": \"affected\", \"version\": \"2025.25\"}, {\"status\": \"affected\", \"version\": \"2025.26\"}, {\"status\": \"affected\", \"version\": \"2025.27\"}, {\"status\": \"affected\", \"version\": \"2025.28\"}, {\"status\": \"affected\", \"version\": \"2025.29\"}, {\"status\": \"affected\", \"version\": \"2025.30\"}, {\"status\": \"affected\", \"version\": \"2025.31\"}, {\"status\": \"affected\", \"version\": \"2025.32\"}, {\"status\": \"affected\", \"version\": \"2025.33\"}, {\"status\": \"affected\", \"version\": \"2025.34\"}, {\"status\": \"affected\", \"version\": \"2025.35\"}, {\"status\": \"affected\", \"version\": \"2025.36\"}, {\"status\": \"affected\", \"version\": \"2025.37\"}, {\"status\": \"affected\", \"version\": \"2025.38\"}, {\"status\": \"affected\", \"version\": \"2025.39\"}, {\"status\": \"affected\", \"version\": \"2025.40\"}, {\"status\": \"affected\", \"version\": \"2025.41\"}, {\"status\": \"affected\", \"version\": \"2025.42\"}, {\"status\": \"affected\", \"version\": \"2025.43\"}, {\"status\": \"affected\", \"version\": \"2025.44\"}, {\"status\": \"affected\", \"version\": \"2025.45\"}, {\"status\": \"affected\", \"version\": \"2025.46\"}, {\"status\": \"affected\", \"version\": \"2025.47\"}, {\"status\": \"affected\", \"version\": \"2025.48\"}, {\"status\": \"affected\", \"version\": \"2025.49\"}, {\"status\": \"affected\", \"version\": \"2025.50\"}, {\"status\": \"affected\", \"version\": \"2025.51\"}, {\"status\": \"affected\", \"version\": \"2025.52\"}, {\"status\": \"affected\", \"version\": \"2025.53\"}, {\"status\": \"affected\", \"version\": \"2025.54\"}, {\"status\": \"affected\", \"version\": \"2025.55\"}, {\"status\": \"affected\", \"version\": \"2025.56\"}, {\"status\": \"affected\", \"version\": \"2025.57\"}, {\"status\": \"affected\", \"version\": \"2025.58\"}, {\"status\": \"affected\", \"version\": \"2025.59\"}, {\"status\": \"affected\", \"version\": \"2025.60\"}, {\"status\": \"affected\", \"version\": \"2025.61\"}, {\"status\": \"affected\", \"version\": \"2025.62\"}, {\"status\": \"affected\", \"version\": \"2025.63\"}, {\"status\": \"affected\", \"version\": \"2025.64\"}, {\"status\": \"affected\", \"version\": \"2025.65\"}, {\"status\": \"affected\", \"version\": \"2025.66\"}, {\"status\": \"affected\", \"version\": \"2025.67\"}, {\"status\": \"affected\", \"version\": \"2025.68\"}, {\"status\": \"affected\", \"version\": \"2025.69\"}, {\"status\": \"affected\", \"version\": \"2025.70\"}, {\"status\": \"affected\", \"version\": \"2025.71\"}, {\"status\": \"affected\", \"version\": \"2025.72\"}, {\"status\": \"affected\", \"version\": \"2025.73\"}, {\"status\": \"affected\", \"version\": \"2025.74\"}, {\"status\": \"affected\", \"version\": \"2025.75\"}, {\"status\": \"affected\", \"version\": \"2025.76\"}, {\"status\": \"affected\", \"version\": \"2025.77\"}, {\"status\": \"affected\", \"version\": \"2025.78\"}, {\"status\": \"affected\", \"version\": \"2025.79\"}, {\"status\": \"affected\", \"version\": \"2025.80\"}, {\"status\": \"affected\", \"version\": \"2025.81\"}, {\"status\": \"affected\", \"version\": \"2025.82\"}, {\"status\": \"affected\", \"version\": \"2025.83\"}, {\"status\": \"affected\", \"version\": \"2025.84\"}, {\"status\": \"affected\", \"version\": \"2025.85\"}, {\"status\": \"affected\", \"version\": \"2025.86\"}, {\"status\": \"affected\", \"version\": \"2025.87\"}, {\"status\": \"affected\", \"version\": \"2025.88\"}, {\"status\": \"affected\", \"version\": \"2025.89\"}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2026-03-07T00:00:00.000Z\", \"value\": \"Advisory disclosed\"}, {\"lang\": \"en\", \"time\": \"2026-03-07T01:00:00.000Z\", \"value\": \"VulDB entry created\"}, {\"lang\": \"en\", \"time\": \"2026-03-16T06:42:50.000Z\", \"value\": \"VulDB entry last update\"}], \"references\": [{\"url\": \"https://vuldb.com/?id.349652\", \"name\": \"VDB-349652 | mkj Dropbear S Range Check curve25519.c unpackneg signature verification\", \"tags\": [\"vdb-entry\", \"technical-description\"]}, {\"url\": \"https://vuldb.com/?ctiid.349652\", \"name\": \"VDB-349652 | CTI Indicators (IOB, IOC, IOA)\", \"tags\": [\"signature\", \"permissions-required\"]}, {\"url\": \"https://vuldb.com/?submit.765933\", \"name\": \"Submit #765933 | GitHub Dropbear 2025.89 Improper Verification of Cryptographic Signature\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://github.com/mkj/dropbear/issues/406\", \"tags\": [\"issue-tracking\"]}, {\"url\": \"https://github.com/mkj/dropbear/pull/407\", \"tags\": [\"issue-tracking\", \"patch\"]}, {\"url\": \"https://github.com/mkj/dropbear/commit/fdec3c90a15447bd538641d85e5a3e3ac981011d\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/str4d/ed25519-java/issues/82#issue-727629226\", \"tags\": [\"issue-tracking\"]}, {\"url\": \"https://github.com/mkj/dropbear/\", \"tags\": [\"product\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The actual existence of this vulnerability is currently in question. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch. The project maintainer explains: \\\"Signature Malleability is not exploitable in SSH protocol. (...) [A] PoC doesn\u0027t exist for SSH implementation, but rather it\u0027s against the internal API.\\\"\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-347\", \"description\": \"Improper Verification of Cryptographic Signature\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-345\", \"description\": \"Insufficient Verification of Data Authenticity\"}]}], \"providerMetadata\": {\"orgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"shortName\": \"VulDB\", \"dateUpdated\": \"2026-03-16T05:39:00.731Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2026-3706\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-16T05:39:00.731Z\", \"dateReserved\": \"2026-03-07T09:05:33.842Z\", \"assignerOrgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"datePublished\": \"2026-03-08T05:02:11.136Z\", \"assignerShortName\": \"VulDB\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…