VYPR
Low severityNVD Advisory· Published Feb 24, 2026· Updated Feb 24, 2026

Incorrect calculation in CIRCL secp384r1 CombinedMult

CVE-2026-1229

Description

The CombinedMult function in the CIRCL ecc/p384 package (secp384r1 curve) produces an incorrect value for specific inputs. The issue is fixed by using complete addition formulas. ECDH and ECDSA signing relying on this curve are not affected.

The bug was fixed in v1.6.3 https://github.com/cloudflare/circl/releases/tag/v1.6.3 .

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The CombinedMult function in CIRCL's P-384 package computes incorrect results for specific inputs due to incomplete addition formulas, fixed in v1.6.3 by switching to complete addition formulas.

Vulnerability

Overview The CombinedMult function in the ecc/p384 package of the CIRCL (Cloudflare Interoperable Reusable Cryptographic Library) library, which implements the secp384r1 (P-384) elliptic curve, produces incorrect output for certain inputs [1]. The root cause is the use of incomplete point addition formulas that do not handle the point doubling case correctly [4]. The fix replaces these formulas with complete addition formulas that correctly handle all valid inputs, including edge cases [1].

Exploitation

Scenario The bug manifests only when the CombinedMult function is called with inputs that trigger the incomplete addition path. However, critical cryptographic operations that rely on P-384, namely ECDH key agreement and ECDSA signature generation, are explicitly not affected [1]. This suggests the function has a narrow scope of usage or that these higher-level protocols avoid the problematic inputs. An attacker would need to identify a system that directly utilizes the affected CombinedMult function with attacker-controlled inputs to exploit the incorrect output.

Impact

If triggered by the bug If exploited, the incorrect computation could lead to unexpected results from the CombinedMult function. The severity is limited because the library itself advises caution in production use, and the most common P-384 operations (ECDH and ECDSA) are unaffected [2]. No information is provided about whether the bug leads to security-critical failures like key recovery or signature forgery; the description only states that the value is incorrect for specific inputs [1].

Mitigation

The vulnerability is fixed in CIRCL version v1.6.3, released on the project's GitHub releases page [3]. Users should update to this version or later to eliminate the bug. There is no mention of a CVSS score or inclusion in CISA's Known Exploited Vulnerabilities (KEV) catalog, suggesting limited real-world exploitation.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/cloudflare/circlGo
< 1.6.31.6.3

Affected products

2
  • Cloudflare/Circlllm-fuzzy
    Range: < v1.6.3
  • Cloudflare/CIRCLv5
    Range: CIRCL up to version 1.6.2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.