Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. sm2
  4. ›
  5. CVE-2026-22698

CVE-2026-22698: SM2-PKE has 32-bit Biased Nonce Vulnerability

January 9, 2026 (updated January 11, 2026)

A critical vulnerability exists in the SM2 Public Key Encryption (PKE) implementation where the ephemeral nonce k is generated with severely reduced entropy. A unit mismatch error causes the nonce generation function to request only 32 bits of randomness instead of the expected 256 bits. This reduces the security of the encryption from a 128-bit level to a trivial 16-bit level, allowing a practical attack to recover the nonce k and decrypt any ciphertext given only the public key and ciphertext.

References

  • crates.io/crates/sm2/0.14.0-pre.0
  • crates.io/crates/sm2/0.14.0-rc.0
  • github.com/RustCrypto/elliptic-curves
  • github.com/RustCrypto/elliptic-curves/commit/4781762f23ff22ab34763410f648128055c93731
  • github.com/RustCrypto/elliptic-curves/commit/e4f77788130d065d760e57fb109370827110a525
  • github.com/RustCrypto/elliptic-curves/pull/1600
  • github.com/RustCrypto/elliptic-curves/security/advisories/GHSA-w3g8-fp6j-wvqw
  • github.com/advisories/GHSA-w3g8-fp6j-wvqw
  • nvd.nist.gov/vuln/detail/CVE-2026-22698

Code Behaviors & Features

Detect and mitigate CVE-2026-22698 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.14.0-pre.0 up to 0.14.0-rc.4

Solution

Unfortunately, there is no solution available yet.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-331: Insufficient Entropy

Source file

cargo/sm2/CVE-2026-22698.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:35:56 +0000.