CVE-2024-21484
Description
Versions of the package jsrsasign before 11.0.0 are vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process. An attacker can decrypt ciphertexts by exploiting the Marvin security flaw. Exploiting this vulnerability requires the attacker to have access to a large number of ciphertexts encrypted with the same key. Workaround The vulnerability can be mitigated by finding and replacing RSA and RSAOAEP decryption with another crypto library.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
jsrsasign versions before 11.0.0 are vulnerable to the Marvin Attack, a timing side-channel enabling RSA decryption and signature forgery.
Vulnerability
Details
CVE-2024-21484 is an observable discrepancy vulnerability in the jsrsasign library versions prior to 11.0.0. The flaw resides in the RSA PKCS1.5 and RSAOAEP decryption processes, which leak timing information due to insufficient constant-time implementation. This is a manifestation of the Marvin Attack, a timing-based variant of the Bleichenbacher attack that exploits side-channel leakage in RSA operations [1][2].
Exploitation
An attacker can exploit this vulnerability by observing the time taken for RSA decryption operations performed with the same private key. The attack requires access to a large number of ciphertexts encrypted with the same key. Statistical analysis of timing measurements enables the attacker to distinguish differences in the decryption process, gradually recovering the plaintext [2][4]. The attack is practical even with a relatively small number of measurements; tests on isolated hardware showed statistically significant timing differences with as few as 100 measurements per sample [4].
Impact
Successful exploitation allows an attacker to decrypt RSA ciphertexts and forge RSA signatures. In TLS contexts, if a server defaults to RSA encryption key exchanges, an attacker can record and later decrypt sessions. For forward-secure cipher suites, forging a server signature within the connection timeout is challenging but not impossible [1].
Mitigation
The vulnerability is fixed in jsrsasign version 11.0.0, which no longer supports RSA PKCS#1.5 and RSAOAEP encryption/decryption due to this issue [3]. Users unable to upgrade immediately should replace RSA and RSAOAEP decryption with another crypto library as a workaround [2]. Note that jsrsasign reached end of support on June 3, 2026, and users are encouraged to migrate to alternative libraries [3].
- The Marvin Attack
- NVD - CVE-2024-21484
- GitHub - kjur/jsrsasign: CAUTION: END OF SUPPORT ON 3 JUN 2026. The 'jsrsasign' (RSA-Sign JavaScript Library) is an opensource free cryptography library supporting RSA/RSAPSS/ECDSA/DSA signing/validation, ASN.1, PKCS#1/5/8 private/public key, X.509 certificate, CRL, OCSP, CMS SignedData, TimeStamp, CAdES and JSON Web Signature/Token in pure JavaScript.
- jsrsasign vulnerable to the Marvin Attack
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
jsrsasignnpm | < 11.0.0 | 11.0.0 |
Affected products
2- jsrsasign/jsrsasigndescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- github.com/advisories/GHSA-rh63-9qcf-83gfghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-21484ghsaADVISORY
- github.com/kjur/jsrsasign/issues/598ghsaWEB
- github.com/kjur/jsrsasign/releases/tag/11.0.0ghsaWEB
- github.com/kjur/jsrsasign/security/advisories/GHSA-rh63-9qcf-83gfghsaWEB
- people.redhat.com/~hkario/marvinghsaWEB
- security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6070734ghsaWEB
- security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-6070733ghsaWEB
- security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6070732ghsaWEB
- security.snyk.io/vuln/SNYK-JS-JSRSASIGN-6070731ghsaWEB
- people.redhat.com/~hkario/marvin/mitre
News mentions
0No linked articles in our index yet.