DEV Community

CVE Reports
CVE Reports

Posted on • Originally published at cvereports.com

CVE-2026-26007: Living on the Edge: Subgroup Attacks in Python Cryptography

Living on the Edge: Subgroup Attacks in Python Cryptography

Vulnerability ID: CVE-2026-26007
CVSS Score: 8.2
Published: 2026-02-10

A high-severity flaw in the standard Python cryptography library allows attackers to recover private keys when using binary elliptic curves. By exploiting missing subgroup validation, malicious actors can perform Small Subgroup Attacks to leak private key bits via ECDH key exchange.

TL;DR

Missing validation in pyca/cryptography allowed attackers to force operations into small subgroups on binary curves (SECT), leading to private key recovery via the Chinese Remainder Theorem.


⚠️ Exploit Status: POC

Technical Details

  • CWE: CWE-345 (Insufficient Verification of Data Authenticity)
  • CVSS v4.0: 8.2 (High)
  • Attack Vector: Network
  • Attack Complexity: High (Requires specific curve usage)
  • Privileges Required: None
  • Impact: Private Key Extraction

Affected Systems

  • Python applications performing ECDH using cryptography
  • Systems utilizing Binary Elliptic Curves (SECT family)
  • Legacy banking or government communication protocols
  • cryptography: < 46.0.5 (Fixed in: 46.0.5)

Code Analysis

Commit: 0eebb9d

Fixes subgroup validation for curves with cofactors > 1

rust/src/backend/ec.rs: + check_key() if cofactor > 1
Enter fullscreen mode Exit fullscreen mode

Exploit Details

Mitigation Strategies

  • Input Validation
  • Cryptographic Parameter Verification
  • Deprecation of Legacy Primitives

Remediation Steps:

  1. Upgrade cryptography package to version >= 46.0.5 immediately.
  2. Run pip install --upgrade cryptography.
  3. Audit codebase for usage of SECT family elliptic curves (e.g., SECT283K1).
  4. Migrate legacy crypto implementations to Prime curves (P-256) or Edwards curves (X25519).

References


Read the full report for CVE-2026-26007 on our website for more details including interactive diagrams and full exploit analysis.

Top comments (0)