Action not permitted
Modal body text goes here.
Modal Title
Modal Body
GHSA-87G2-JPRQ-4CMC
Vulnerability from github – Published: 2026-03-08 06:31 – Updated: 2026-03-08 06:31
VLAI?
Details
A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The exploit has been publicly disclosed and may be utilized. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch.
Severity ?
{
"affected": [],
"aliases": [
"CVE-2026-3706"
],
"database_specific": {
"cwe_ids": [
"CWE-345"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-03-08T05:16:31Z",
"severity": "MODERATE"
},
"details": "A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The exploit has been publicly disclosed and may be utilized. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch.",
"id": "GHSA-87g2-jprq-4cmc",
"modified": "2026-03-08T06:31:10Z",
"published": "2026-03-08T06:31:10Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3706"
},
{
"type": "WEB",
"url": "https://github.com/mkj/dropbear/issues/406#issue-3978907798"
},
{
"type": "WEB",
"url": "https://github.com/str4d/ed25519-java/issues/82#issue-727629226"
},
{
"type": "WEB",
"url": "https://github.com/mkj/dropbear/pull/407"
},
{
"type": "WEB",
"url": "https://github.com/mkj/dropbear/commit/fdec3c90a15447bd538641d85e5a3e3ac981011d"
},
{
"type": "WEB",
"url": "https://github.com/mkj/dropbear"
},
{
"type": "WEB",
"url": "https://vuldb.com/?ctiid.349652"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.349652"
},
{
"type": "WEB",
"url": "https://vuldb.com/?submit.765933"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
]
}
CVE-2026-3706 (GCVE-0-2026-3706)
Vulnerability from cvelistv5 – Published: 2026-03-08 05:02 – Updated: 2026-03-08 05:02 X_Open Source
VLAI?
EPSS
Title
mkj Dropbear S Range Check curve25519.c unpackneg signature verification
Summary
A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The exploit has been publicly disclosed and may be utilized. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch.
Severity ?
CWE
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| mkj | Dropbear |
Affected:
2025.0
Affected: 2025.1 Affected: 2025.2 Affected: 2025.3 Affected: 2025.4 Affected: 2025.5 Affected: 2025.6 Affected: 2025.7 Affected: 2025.8 Affected: 2025.9 Affected: 2025.10 Affected: 2025.11 Affected: 2025.12 Affected: 2025.13 Affected: 2025.14 Affected: 2025.15 Affected: 2025.16 Affected: 2025.17 Affected: 2025.18 Affected: 2025.19 Affected: 2025.20 Affected: 2025.21 Affected: 2025.22 Affected: 2025.23 Affected: 2025.24 Affected: 2025.25 Affected: 2025.26 Affected: 2025.27 Affected: 2025.28 Affected: 2025.29 Affected: 2025.30 Affected: 2025.31 Affected: 2025.32 Affected: 2025.33 Affected: 2025.34 Affected: 2025.35 Affected: 2025.36 Affected: 2025.37 Affected: 2025.38 Affected: 2025.39 Affected: 2025.40 Affected: 2025.41 Affected: 2025.42 Affected: 2025.43 Affected: 2025.44 Affected: 2025.45 Affected: 2025.46 Affected: 2025.47 Affected: 2025.48 Affected: 2025.49 Affected: 2025.50 Affected: 2025.51 Affected: 2025.52 Affected: 2025.53 Affected: 2025.54 Affected: 2025.55 Affected: 2025.56 Affected: 2025.57 Affected: 2025.58 Affected: 2025.59 Affected: 2025.60 Affected: 2025.61 Affected: 2025.62 Affected: 2025.63 Affected: 2025.64 Affected: 2025.65 Affected: 2025.66 Affected: 2025.67 Affected: 2025.68 Affected: 2025.69 Affected: 2025.70 Affected: 2025.71 Affected: 2025.72 Affected: 2025.73 Affected: 2025.74 Affected: 2025.75 Affected: 2025.76 Affected: 2025.77 Affected: 2025.78 Affected: 2025.79 Affected: 2025.80 Affected: 2025.81 Affected: 2025.82 Affected: 2025.83 Affected: 2025.84 Affected: 2025.85 Affected: 2025.86 Affected: 2025.87 Affected: 2025.88 Affected: 2025.89 |
Credits
pythok (VulDB User)
{
"containers": {
"cna": {
"affected": [
{
"modules": [
"S Range Check"
],
"product": "Dropbear",
"vendor": "mkj",
"versions": [
{
"status": "affected",
"version": "2025.0"
},
{
"status": "affected",
"version": "2025.1"
},
{
"status": "affected",
"version": "2025.2"
},
{
"status": "affected",
"version": "2025.3"
},
{
"status": "affected",
"version": "2025.4"
},
{
"status": "affected",
"version": "2025.5"
},
{
"status": "affected",
"version": "2025.6"
},
{
"status": "affected",
"version": "2025.7"
},
{
"status": "affected",
"version": "2025.8"
},
{
"status": "affected",
"version": "2025.9"
},
{
"status": "affected",
"version": "2025.10"
},
{
"status": "affected",
"version": "2025.11"
},
{
"status": "affected",
"version": "2025.12"
},
{
"status": "affected",
"version": "2025.13"
},
{
"status": "affected",
"version": "2025.14"
},
{
"status": "affected",
"version": "2025.15"
},
{
"status": "affected",
"version": "2025.16"
},
{
"status": "affected",
"version": "2025.17"
},
{
"status": "affected",
"version": "2025.18"
},
{
"status": "affected",
"version": "2025.19"
},
{
"status": "affected",
"version": "2025.20"
},
{
"status": "affected",
"version": "2025.21"
},
{
"status": "affected",
"version": "2025.22"
},
{
"status": "affected",
"version": "2025.23"
},
{
"status": "affected",
"version": "2025.24"
},
{
"status": "affected",
"version": "2025.25"
},
{
"status": "affected",
"version": "2025.26"
},
{
"status": "affected",
"version": "2025.27"
},
{
"status": "affected",
"version": "2025.28"
},
{
"status": "affected",
"version": "2025.29"
},
{
"status": "affected",
"version": "2025.30"
},
{
"status": "affected",
"version": "2025.31"
},
{
"status": "affected",
"version": "2025.32"
},
{
"status": "affected",
"version": "2025.33"
},
{
"status": "affected",
"version": "2025.34"
},
{
"status": "affected",
"version": "2025.35"
},
{
"status": "affected",
"version": "2025.36"
},
{
"status": "affected",
"version": "2025.37"
},
{
"status": "affected",
"version": "2025.38"
},
{
"status": "affected",
"version": "2025.39"
},
{
"status": "affected",
"version": "2025.40"
},
{
"status": "affected",
"version": "2025.41"
},
{
"status": "affected",
"version": "2025.42"
},
{
"status": "affected",
"version": "2025.43"
},
{
"status": "affected",
"version": "2025.44"
},
{
"status": "affected",
"version": "2025.45"
},
{
"status": "affected",
"version": "2025.46"
},
{
"status": "affected",
"version": "2025.47"
},
{
"status": "affected",
"version": "2025.48"
},
{
"status": "affected",
"version": "2025.49"
},
{
"status": "affected",
"version": "2025.50"
},
{
"status": "affected",
"version": "2025.51"
},
{
"status": "affected",
"version": "2025.52"
},
{
"status": "affected",
"version": "2025.53"
},
{
"status": "affected",
"version": "2025.54"
},
{
"status": "affected",
"version": "2025.55"
},
{
"status": "affected",
"version": "2025.56"
},
{
"status": "affected",
"version": "2025.57"
},
{
"status": "affected",
"version": "2025.58"
},
{
"status": "affected",
"version": "2025.59"
},
{
"status": "affected",
"version": "2025.60"
},
{
"status": "affected",
"version": "2025.61"
},
{
"status": "affected",
"version": "2025.62"
},
{
"status": "affected",
"version": "2025.63"
},
{
"status": "affected",
"version": "2025.64"
},
{
"status": "affected",
"version": "2025.65"
},
{
"status": "affected",
"version": "2025.66"
},
{
"status": "affected",
"version": "2025.67"
},
{
"status": "affected",
"version": "2025.68"
},
{
"status": "affected",
"version": "2025.69"
},
{
"status": "affected",
"version": "2025.70"
},
{
"status": "affected",
"version": "2025.71"
},
{
"status": "affected",
"version": "2025.72"
},
{
"status": "affected",
"version": "2025.73"
},
{
"status": "affected",
"version": "2025.74"
},
{
"status": "affected",
"version": "2025.75"
},
{
"status": "affected",
"version": "2025.76"
},
{
"status": "affected",
"version": "2025.77"
},
{
"status": "affected",
"version": "2025.78"
},
{
"status": "affected",
"version": "2025.79"
},
{
"status": "affected",
"version": "2025.80"
},
{
"status": "affected",
"version": "2025.81"
},
{
"status": "affected",
"version": "2025.82"
},
{
"status": "affected",
"version": "2025.83"
},
{
"status": "affected",
"version": "2025.84"
},
{
"status": "affected",
"version": "2025.85"
},
{
"status": "affected",
"version": "2025.86"
},
{
"status": "affected",
"version": "2025.87"
},
{
"status": "affected",
"version": "2025.88"
},
{
"status": "affected",
"version": "2025.89"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pythok (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The exploit has been publicly disclosed and may be utilized. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 2.6,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-347",
"description": "Improper Verification of Cryptographic Signature",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-345",
"description": "Insufficient Verification of Data Authenticity",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-08T05:02:11.136Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-349652 | mkj Dropbear S Range Check curve25519.c unpackneg signature verification",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.349652"
},
{
"name": "VDB-349652 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.349652"
},
{
"name": "Submit #765933 | GitHub Dropbear 2025.89 Improper Verification of Cryptographic Signature",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.765933"
},
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/str4d/ed25519-java/issues/82#issue-727629226"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/mkj/dropbear/pull/407"
},
{
"tags": [
"exploit",
"issue-tracking"
],
"url": "https://github.com/mkj/dropbear/issues/406#issue-3978907798"
},
{
"tags": [
"patch"
],
"url": "https://github.com/mkj/dropbear/commit/fdec3c90a15447bd538641d85e5a3e3ac981011d"
},
{
"tags": [
"product"
],
"url": "https://github.com/mkj/dropbear/"
}
],
"tags": [
"x_open-source"
],
"timeline": [
{
"lang": "en",
"time": "2026-03-07T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2026-03-07T01:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2026-03-07T10:12:40.000Z",
"value": "VulDB entry last update"
}
],
"title": "mkj Dropbear S Range Check curve25519.c unpackneg signature verification"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2026-3706",
"datePublished": "2026-03-08T05:02:11.136Z",
"dateReserved": "2026-03-07T09:05:33.842Z",
"dateUpdated": "2026-03-08T05:02:11.136Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…