CVE-2023-30588

Updated: 2025-11-10 00:48:58.674622

Description:

When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x MEDIUM 5.3

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

Debian 13 nodejs 18 5.3 MEDIUM Already Fixed 2025-12-11 15:04:59
Debian 13 nodejs 24 5.3 MEDIUM Already Fixed 2026-02-17 18:20:22
Debian 13 nodejs 12 5.3 MEDIUM Not Vulnerable 2025-12-11 15:05:02
Debian 13 nodejs 22 5.3 MEDIUM Already Fixed 2026-02-17 18:20:22
Debian 13 nodejs 14 5.3 MEDIUM Not Vulnerable 2025-12-11 15:05:00
Debian 13 nodejs 20 5.3 MEDIUM Already Fixed 2025-12-11 15:05:01
Debian 13 nodejs 23 5.3 MEDIUM Not Vulnerable 2026-02-11 12:35:56
Debian 13 nodejs 16 5.3 MEDIUM Already Fixed 2025-12-11 15:05:02
EL 10 nodejs 16 5.3 MEDIUM Already Fixed 2026-02-10 15:17:56
EL 10 nodejs 20 5.3 MEDIUM Already Fixed 2026-02-05 14:09:35
Total: 67