
We found results for “”
CVE-2025-53359
Good to know:

Date: July 2, 2025
ethereum is a common ethereum structs for Rust. Prior to ethereum crate v0.18.0, signature malleability (according to EIP-2) was only checked for "legacy" transactions, but not for EIP-2930, EIP-1559 and EIP-7702 transactions. This is a specification deviation. The signature malleability itself is not a security issue and not as high of a risk if the ethereum crate is used on a single-implementation blockchain. This issue has been patched in version v0.18.0. A workaround for this issue involves manually checking transaction malleability outside of the crate, however upgrading is recommended.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Improper Check for Unusual or Exceptional Conditions
CWE-754Top Fix

Upgrade Version
Upgrade to version ethereum - 0.18.0;https://github.com/rust-ethereum/ethereum.git - v0.18.0
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | LOW |
Availability (A): | NONE |