{"api_version":"1","generated_at":"2026-04-22T22:49:33+00:00","cve":"CVE-2026-3706","urls":{"html":"https://cve.report/CVE-2026-3706","api":"https://cve.report/api/cve/CVE-2026-3706.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-3706","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-3706"},"summary":{"title":"mkj Dropbear S Range Check curve25519.c unpackneg signature verification","description":"A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The actual existence of this vulnerability is currently in question. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch. The project maintainer explains: \"Signature Malleability is not exploitable in SSH protocol. (...) [A] PoC doesn't exist for SSH implementation, but rather it's against the internal API.\"","state":"PUBLISHED","assigner":"VulDB","published_at":"2026-03-08 05:16:31","updated_at":"2026-04-22 21:27:27"},"problem_types":["CWE-345","CWE-347","CWE-347 Improper Verification of Cryptographic Signature","CWE-345 Insufficient Verification of Data Authenticity"],"metrics":[{"version":"4.0","source":"cna@vuldb.com","type":"Secondary","score":"1.7","severity":"LOW","vector":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":1.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"UNREPORTED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"DECLARED","score":"6.3","severity":"MEDIUM","vector":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U","data":{"baseScore":6.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U","version":"4.0"}},{"version":"3.1","source":"cna@vuldb.com","type":"Secondary","score":"3.7","severity":"LOW","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"3.7","severity":"LOW","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C","data":{"baseScore":3.7,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C","version":"3.1"}},{"version":"3.0","source":"CNA","type":"DECLARED","score":"3.7","severity":"LOW","vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C","data":{"baseScore":3.7,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C","version":"3.0"}},{"version":"2.0","source":"cna@vuldb.com","type":"Secondary","score":"2.6","severity":"","vector":"AV:N/AC:H/Au:N/C:N/I:P/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:N/I:P/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"}},{"version":"2.0","source":"CNA","type":"DECLARED","score":"2.6","severity":"","vector":"AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C","data":{"baseScore":2.6,"vectorString":"AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C","version":"2.0"}}],"references":[{"url":"https://vuldb.com/?submit.765933","name":"https://vuldb.com/?submit.765933","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?id.349652","name":"https://vuldb.com/?id.349652","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/mkj/dropbear/commit/fdec3c90a15447bd538641d85e5a3e3ac981011d","name":"https://github.com/mkj/dropbear/commit/fdec3c90a15447bd538641d85e5a3e3ac981011d","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/mkj/dropbear/issues/406","name":"https://github.com/mkj/dropbear/issues/406","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/mkj/dropbear/","name":"https://github.com/mkj/dropbear/","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/str4d/ed25519-java/issues/82#issue-727629226","name":"https://github.com/str4d/ed25519-java/issues/82#issue-727629226","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?ctiid.349652","name":"https://vuldb.com/?ctiid.349652","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/mkj/dropbear/pull/407","name":"https://github.com/mkj/dropbear/pull/407","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-3706","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-3706","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.0","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.1","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.2","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.3","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.4","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.5","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.6","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.7","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.8","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.9","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.10","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.11","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.12","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.13","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.14","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.15","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.16","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.17","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.18","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.19","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.20","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.21","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.22","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.23","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.24","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.25","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.26","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.27","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.28","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.29","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.30","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.31","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.32","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.33","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.34","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.35","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.36","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.37","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.38","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.39","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.40","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.41","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.42","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.43","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.44","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.45","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.46","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.47","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.48","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.49","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.50","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.51","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.52","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.53","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.54","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.55","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.56","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.57","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.58","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.59","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.60","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.61","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.62","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.63","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.64","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.65","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.66","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.67","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.68","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.69","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.70","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.71","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.72","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.73","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.74","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.75","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.76","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.77","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.78","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.79","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.80","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.81","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.82","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.83","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.84","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.85","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.86","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.87","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.88","platforms":[]},{"source":"CNA","vendor":"mkj","product":"Dropbear","version":"affected 2025.89","platforms":[]}],"timeline":[{"source":"CNA","time":"2026-03-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"source":"CNA","time":"2026-03-07T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"source":"CNA","time":"2026-03-16T06:42:50.000Z","lang":"en","value":"VulDB entry last update"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"pythok (VulDB User)","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-3706","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-03-10T14:05:08.951683Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-22T18:54:11.224Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["exploit"],"url":"https://github.com/mkj/dropbear/issues/406"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"modules":["S Range Check"],"product":"Dropbear","vendor":"mkj","versions":[{"status":"affected","version":"2025.0"},{"status":"affected","version":"2025.1"},{"status":"affected","version":"2025.2"},{"status":"affected","version":"2025.3"},{"status":"affected","version":"2025.4"},{"status":"affected","version":"2025.5"},{"status":"affected","version":"2025.6"},{"status":"affected","version":"2025.7"},{"status":"affected","version":"2025.8"},{"status":"affected","version":"2025.9"},{"status":"affected","version":"2025.10"},{"status":"affected","version":"2025.11"},{"status":"affected","version":"2025.12"},{"status":"affected","version":"2025.13"},{"status":"affected","version":"2025.14"},{"status":"affected","version":"2025.15"},{"status":"affected","version":"2025.16"},{"status":"affected","version":"2025.17"},{"status":"affected","version":"2025.18"},{"status":"affected","version":"2025.19"},{"status":"affected","version":"2025.20"},{"status":"affected","version":"2025.21"},{"status":"affected","version":"2025.22"},{"status":"affected","version":"2025.23"},{"status":"affected","version":"2025.24"},{"status":"affected","version":"2025.25"},{"status":"affected","version":"2025.26"},{"status":"affected","version":"2025.27"},{"status":"affected","version":"2025.28"},{"status":"affected","version":"2025.29"},{"status":"affected","version":"2025.30"},{"status":"affected","version":"2025.31"},{"status":"affected","version":"2025.32"},{"status":"affected","version":"2025.33"},{"status":"affected","version":"2025.34"},{"status":"affected","version":"2025.35"},{"status":"affected","version":"2025.36"},{"status":"affected","version":"2025.37"},{"status":"affected","version":"2025.38"},{"status":"affected","version":"2025.39"},{"status":"affected","version":"2025.40"},{"status":"affected","version":"2025.41"},{"status":"affected","version":"2025.42"},{"status":"affected","version":"2025.43"},{"status":"affected","version":"2025.44"},{"status":"affected","version":"2025.45"},{"status":"affected","version":"2025.46"},{"status":"affected","version":"2025.47"},{"status":"affected","version":"2025.48"},{"status":"affected","version":"2025.49"},{"status":"affected","version":"2025.50"},{"status":"affected","version":"2025.51"},{"status":"affected","version":"2025.52"},{"status":"affected","version":"2025.53"},{"status":"affected","version":"2025.54"},{"status":"affected","version":"2025.55"},{"status":"affected","version":"2025.56"},{"status":"affected","version":"2025.57"},{"status":"affected","version":"2025.58"},{"status":"affected","version":"2025.59"},{"status":"affected","version":"2025.60"},{"status":"affected","version":"2025.61"},{"status":"affected","version":"2025.62"},{"status":"affected","version":"2025.63"},{"status":"affected","version":"2025.64"},{"status":"affected","version":"2025.65"},{"status":"affected","version":"2025.66"},{"status":"affected","version":"2025.67"},{"status":"affected","version":"2025.68"},{"status":"affected","version":"2025.69"},{"status":"affected","version":"2025.70"},{"status":"affected","version":"2025.71"},{"status":"affected","version":"2025.72"},{"status":"affected","version":"2025.73"},{"status":"affected","version":"2025.74"},{"status":"affected","version":"2025.75"},{"status":"affected","version":"2025.76"},{"status":"affected","version":"2025.77"},{"status":"affected","version":"2025.78"},{"status":"affected","version":"2025.79"},{"status":"affected","version":"2025.80"},{"status":"affected","version":"2025.81"},{"status":"affected","version":"2025.82"},{"status":"affected","version":"2025.83"},{"status":"affected","version":"2025.84"},{"status":"affected","version":"2025.85"},{"status":"affected","version":"2025.86"},{"status":"affected","version":"2025.87"},{"status":"affected","version":"2025.88"},{"status":"affected","version":"2025.89"}]}],"credits":[{"lang":"en","type":"reporter","value":"pythok (VulDB User)"}],"descriptions":[{"lang":"en","value":"A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The actual existence of this vulnerability is currently in question. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch. The project maintainer explains: \"Signature Malleability is not exploitable in SSH protocol. (...) [A] PoC doesn't exist for SSH implementation, but rather it's against the internal API.\""}],"metrics":[{"cvssV4_0":{"baseScore":6.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U","version":"4.0"}},{"cvssV3_1":{"baseScore":3.7,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C","version":"3.1"}},{"cvssV3_0":{"baseScore":3.7,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C","version":"3.0"}},{"cvssV2_0":{"baseScore":2.6,"vectorString":"AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C","version":"2.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-347","description":"Improper Verification of Cryptographic Signature","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-345","description":"Insufficient Verification of Data Authenticity","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-03-16T05:39:00.731Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"name":"VDB-349652 | mkj Dropbear S Range Check curve25519.c unpackneg signature verification","tags":["vdb-entry","technical-description"],"url":"https://vuldb.com/?id.349652"},{"name":"VDB-349652 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"],"url":"https://vuldb.com/?ctiid.349652"},{"name":"Submit #765933 | GitHub Dropbear 2025.89 Improper Verification of Cryptographic Signature","tags":["third-party-advisory"],"url":"https://vuldb.com/?submit.765933"},{"tags":["issue-tracking"],"url":"https://github.com/mkj/dropbear/issues/406"},{"tags":["issue-tracking","patch"],"url":"https://github.com/mkj/dropbear/pull/407"},{"tags":["patch"],"url":"https://github.com/mkj/dropbear/commit/fdec3c90a15447bd538641d85e5a3e3ac981011d"},{"tags":["issue-tracking"],"url":"https://github.com/str4d/ed25519-java/issues/82#issue-727629226"},{"tags":["product"],"url":"https://github.com/mkj/dropbear/"}],"tags":["disputed","x_open-source"],"timeline":[{"lang":"en","time":"2026-03-07T00:00:00.000Z","value":"Advisory disclosed"},{"lang":"en","time":"2026-03-07T01:00:00.000Z","value":"VulDB entry created"},{"lang":"en","time":"2026-03-16T06:42:50.000Z","value":"VulDB entry last update"}],"title":"mkj Dropbear S Range Check curve25519.c unpackneg signature verification"}},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2026-3706","datePublished":"2026-03-08T05:02:11.136Z","dateReserved":"2026-03-07T09:05:33.842Z","dateUpdated":"2026-04-22T18:54:11.224Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-08 05:16:31","lastModifiedDate":"2026-04-22 21:27:27","problem_types":["CWE-345","CWE-347","CWE-347 Improper Verification of Cryptographic Signature","CWE-345 Insufficient Verification of Data Authenticity"],"metrics":{"cvssMetricV40":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":1.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"UNREPORTED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":1.4}],"cvssMetricV2":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:N/I:P/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"3706","Ordinal":"1","Title":"mkj Dropbear S Range Check curve25519.c unpackneg signature veri","CVE":"CVE-2026-3706","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"3706","Ordinal":"1","NoteData":"A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The actual existence of this vulnerability is currently in question. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch. The project maintainer explains: \"Signature Malleability is not exploitable in SSH protocol. (...) [A] PoC doesn't exist for SSH implementation, but rather it's against the internal API.\"","Type":"Description","Title":"mkj Dropbear S Range Check curve25519.c unpackneg signature veri"}]}}}