Protocol Compliance Bug in Thinbus Javascript Secure Remote Password
CVE-2025-54885
6.9MEDIUM
What is CVE-2025-54885?
A protocol compliance issue in Thinbus Javascript Secure Remote Password versions 2.0.0 and below allows for the generation of a fixed 252 bits of entropy instead of the intended safe prime bit length of 2048 bits. This oversight results in a client public value derived from a private value that falls short of the specification by 4 bits. Consequently, the security margin of the protocol is diminished, leading to practical exploitability. The server utilizes its full-sized 2048-bit random number to create shared session keys and password proofs. This vulnerability is addressed in version 2.0.1.
Affected Version(s)
thinbus-srp-npm < 2.0.1