Skip to content

Conversation

@sunnypatell
Copy link

Changes

Added missing CVSS 3.1 scoring to GHSA-r6ph-v2qm-q3c2 (Python cryptography Subgroup Attack on SECT Curves).

Added:

  • CVSS 3.1 vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N (7.4 High)

Reason for change

This advisory had no CVSS 3.1 score. NVD only provides CVSS 4.0 scoring (8.2) for CVE-2026-26007. Adding a CVSS 3.1 vector ensures broader compatibility with vulnerability management tools that rely on CVSS 3.1 for severity assessment.

CVSS justification

  • AV:N because the subgroup attack targets ECDH key exchanges performed over the network (TLS, SSH, any protocol using the affected SECT binary curves)
  • AC:H because exploitation requires the target to be using one of the specific vulnerable SECT binary curves (sect163k1, sect163r2, sect233k1, sect233r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1), which are uncommon in practice compared to prime curves like P-256/P-384
  • PR:N because the attacker is an unauthenticated network peer participating in key exchange
  • UI:N because ECDH key exchanges are processed automatically during protocol handshakes
  • C:H because the missing subgroup validation allows the attacker to recover private key bits through a small-subgroup/invalid-curve attack
  • I:H because a recovered ECDH private key enables signature forgery (ECDSA) and key impersonation. The CVSS 4.0 vector uses VI:N but this underrates the integrity impact: private key recovery directly enables forging signatures for the same key pair
  • A:N because the attack does not affect availability

The difference from the CVSS 4.0 vector (which uses VI:N) is justified because subgroup attacks on elliptic curves are a well-documented class that enables both key recovery (C:H) and signature forgery (I:H). Discovered by Tencent Xuanwu Lab's Atuin Automated Vulnerability Discovery Engine.

Supporting links

Copilot AI review requested due to automatic review settings February 12, 2026 03:39
@github-actions github-actions bot changed the base branch from main to sunnypatell/advisory-improvement-6852 February 12, 2026 03:40
Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR adds a missing CVSS 3.1 score to the security advisory GHSA-r6ph-v2qm-q3c2, which documents a subgroup attack vulnerability in the Python cryptography library affecting SECT elliptic curves. The advisory previously only had CVSS 4.0 scoring from NVD. Adding CVSS 3.1 scoring (vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N, score: 7.4 High) ensures broader compatibility with vulnerability management tools that rely on CVSS 3.1 for severity assessment.

Changes:

  • Added CVSS 3.1 severity entry with vector string and score to the advisory JSON file

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant