Incorrect calculation in CIRCL secp384r1 CombinedMult
Description
The CombinedMult function in the CIRCL ecc/p384 package (secp384r1 curve) produces an incorrect value for specific inputs. The issue is fixed by using complete addition formulas. ECDH and ECDSA signing relying on this curve are not affected.
The bug was fixed in v1.6.3 https://github.com/cloudflare/circl/releases/tag/v1.6.3 .
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The CombinedMult function in CIRCL's P-384 package computes incorrect results for specific inputs due to incomplete addition formulas, fixed in v1.6.3 by switching to complete addition formulas.
Vulnerability
Overview The CombinedMult function in the ecc/p384 package of the CIRCL (Cloudflare Interoperable Reusable Cryptographic Library) library, which implements the secp384r1 (P-384) elliptic curve, produces incorrect output for certain inputs [1]. The root cause is the use of incomplete point addition formulas that do not handle the point doubling case correctly [4]. The fix replaces these formulas with complete addition formulas that correctly handle all valid inputs, including edge cases [1].
Exploitation
Scenario The bug manifests only when the CombinedMult function is called with inputs that trigger the incomplete addition path. However, critical cryptographic operations that rely on P-384, namely ECDH key agreement and ECDSA signature generation, are explicitly not affected [1]. This suggests the function has a narrow scope of usage or that these higher-level protocols avoid the problematic inputs. An attacker would need to identify a system that directly utilizes the affected CombinedMult function with attacker-controlled inputs to exploit the incorrect output.
Impact
If triggered by the bug If exploited, the incorrect computation could lead to unexpected results from the CombinedMult function. The severity is limited because the library itself advises caution in production use, and the most common P-384 operations (ECDH and ECDSA) are unaffected [2]. No information is provided about whether the bug leads to security-critical failures like key recovery or signature forgery; the description only states that the value is incorrect for specific inputs [1].
Mitigation
The vulnerability is fixed in CIRCL version v1.6.3, released on the project's GitHub releases page [3]. Users should update to this version or later to eliminate the bug. There is no mention of a CVSS score or inclusion in CISA's Known Exploited Vulnerabilities (KEV) catalog, suggesting limited real-world exploitation.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/cloudflare/circlGo | < 1.6.3 | 1.6.3 |
Affected products
2- Range: < v1.6.3
- Cloudflare/CIRCLv5Range: CIRCL up to version 1.6.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.