CVE-2026-22705

6.4 MEDIUM

📋 TL;DR

A timing side-channel vulnerability in RustCrypto's Signatures library allows attackers to potentially extract private key information during ML-DSA signing operations. This affects any application using RustCrypto Signatures for digital signatures prior to version 0.1.0-rc.2. The vulnerability could enable signature forgery or private key compromise.

💻 Affected Systems

Products:
  • RustCrypto Signatures library
Versions: All versions prior to 0.1.0-rc.2
Operating Systems: All platforms running Rust applications
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications using ML-DSA signing with the vulnerable Decompose algorithm.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete private key compromise leading to unauthorized data signing, authentication bypass, and impersonation attacks.

🟠

Likely Case

Partial key information leakage requiring sophisticated analysis, potentially enabling targeted attacks against high-value targets.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring, though timing attacks remain difficult to fully mitigate.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Timing side-channel attacks require precise measurements and controlled environments, making exploitation challenging but feasible for determined attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.1.0-rc.2 and later

Vendor Advisory: https://github.com/RustCrypto/signatures/security/advisories/GHSA-hcp2-x6j4-29j7

Restart Required: Yes

Instructions:

1. Update Cargo.toml to use 'signatures = "^0.1.0-rc.2"' 2. Run 'cargo update' 3. Rebuild and redeploy application 4. Restart affected services

🔧 Temporary Workarounds

Disable ML-DSA Signing

all

Temporarily disable ML-DSA signature generation if alternative signing methods are available

Modify application code to use alternative signature algorithms

🧯 If You Can't Patch

  • Implement network-level protections to obscure timing measurements
  • Deploy affected systems in isolated environments with strict access controls

🔍 How to Verify

Check if Vulnerable:

Check Cargo.lock or Cargo.toml for signatures dependency version below 0.1.0-rc.2

Check Version:

grep -A2 -B2 signatures Cargo.lock

Verify Fix Applied:

Verify signatures version is 0.1.0-rc.2 or higher in Cargo.lock

📡 Detection & Monitoring

Log Indicators:

  • Unusual signing operation patterns
  • Multiple failed signature validations

Network Indicators:

  • Repeated timing measurements to signing endpoints
  • Unusual network traffic patterns during signing operations

SIEM Query:

process:rust AND signature_operations > threshold

🔗 References

📤 Share & Export