cryptopp CVE Vulnerabilities & Metrics

Focus on cryptopp vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About cryptopp Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with cryptopp. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total cryptopp CVEs: 13
Earliest CVE date: 01 Jul 2015, 14:59 UTC
Latest CVE date: 18 Dec 2023, 04:15 UTC

Latest CVE reference: CVE-2023-50981

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical cryptopp CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.17

Max CVSS: 5.0

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 5
4.0-6.9 8
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS cryptopp CVEs

These are the five CVEs with the highest CVSS scores for cryptopp, sorted by severity first and recency.

All CVEs for cryptopp

CVE-2023-50981 cryptopp vulnerability CVSS: 0 18 Dec 2023, 04:15 UTC

ModularSquareRoot in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (infinite loop) via crafted DER public-key data associated with squared odd numbers, such as the square of 268995137513890432434389773128616504853.

CVE-2023-50980 cryptopp vulnerability CVSS: 0 18 Dec 2023, 04:15 UTC

gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (application crash) via DER public-key data for an F(2^m) curve, if the degree of each term in the polynomial is not strictly decreasing.

CVE-2023-50979 cryptopp vulnerability CVSS: 0 18 Dec 2023, 04:15 UTC

Crypto++ (aka cryptopp) through 8.9.0 has a Marvin side channel during decryption with PKCS#1 v1.5 padding.

CVE-2022-48570 cryptopp vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

Crypto++ through 8.4 contains a timing side channel in ECDSA signature generation. Function FixedSizeAllocatorWithCleanup could write to memory outside of the allocation if the allocated memory was not 16-byte aligned. NOTE: this issue exists because the CVE-2019-14318 fix was intentionally removed for functionality reasons.

CVE-2021-43398 cryptopp vulnerability CVSS: 5.0 04 Nov 2021, 21:15 UTC

Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks. NOTE: this report is disputed by the vendor and multiple third parties. The execution-time differences are intentional. A user may make a choice of a longer key as a tradeoff between strength and performance. In making this choice, the amount of information leaked to an adversary is of infinitesimal value

CVE-2021-40530 cryptopp vulnerability CVSS: 2.6 06 Sep 2021, 19:15 UTC

The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.

CVE-2019-14318 cryptopp vulnerability CVSS: 4.3 30 Jul 2019, 17:15 UTC

Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because scalar multiplication in ecp.cpp (prime field curves, small leakage) and algebra.cpp (binary field curves, large leakage) is not constant time and leaks the bit length of the scalar among other information.

CVE-2017-9434 cryptopp vulnerability CVSS: 5.0 05 Jun 2017, 14:29 UTC

Crypto++ (aka cryptopp) through 5.6.5 contains an out-of-bounds read vulnerability in zinflate.cpp in the Inflator filter.

CVE-2016-3995 cryptopp vulnerability CVSS: 5.0 13 Feb 2017, 18:59 UTC

The timing attack protection in Rijndael::Enc::ProcessAndXorBlock and Rijndael::Dec::ProcessAndXorBlock in Crypto++ (aka cryptopp) before 5.6.4 may be optimized out by the compiler, which allows attackers to conduct timing attacks.

CVE-2016-9939 cryptopp vulnerability CVSS: 5.0 30 Jan 2017, 21:59 UTC

Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the length field of the ASN.1 object. If there is not enough content octets in the ASN.1 object, then the function will fail and the memory block will be zeroed even if its unused. There is a noticeable delay during the wipe for a large allocation.

CVE-2016-7544 cryptopp vulnerability CVSS: 5.0 30 Jan 2017, 21:59 UTC

Crypto++ 5.6.4 incorrectly uses Microsoft's stack-based _malloca and _freea functions. The library will request a block of memory to align a table in memory. If the table is later reallocated, then the wrong pointer could be freed.

CVE-2016-7420 cryptopp vulnerability CVSS: 4.3 16 Sep 2016, 05:59 UTC

Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement for a compile-time NDEBUG definition disabling the many assert calls that are unintended in production use, which might allow context-dependent attackers to obtain sensitive information by leveraging access to process memory after an assertion failure, as demonstrated by reading a core dump.

CVE-2015-2141 cryptopp vulnerability CVSS: 5.0 01 Jul 2015, 14:59 UTC

The InvertibleRWFunction::CalculateInverse function in rw.cpp in libcrypt++ 5.6.2 does not properly blind private key operations for the Rabin-Williams digital signature algorithm, which allows remote attackers to obtain private keys via a timing attack.