CVE-2026-22866

Source
https://cve.org/CVERecord?id=CVE-2026-22866
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-22866.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-22866
Aliases
Published
2026-02-25T15:47:16.230Z
Modified
2026-02-28T04:45:52.326795Z
Severity
  • 2.7 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
ENS DNSSEC Oracle Vulnerable to RSA Signature Forgery via Missing PKCS#1 v1.5 Padding Validation
Details

Ethereum Name Service (ENS) is a distributed, open, and extensible naming system based on the Ethereum blockchain. In versions 1.6.2 and prior, the RSASHA256Algorithm and RSASHA1Algorithm contracts fail to validate PKCS#1 v1.5 padding structure when verifying RSA signatures. The contracts only check if the last 32 (or 20) bytes of the decrypted signature match the expected hash. This enables Bleichenbacher's 2006 signature forgery attack against DNS zones using RSA keys with low public exponents (e=3). Two ENS-supported TLDs (.cc and .name) use e=3 for their Key Signing Keys, allowing any domain under these TLDs to be fraudulently claimed on ENS without DNS ownership. Apatch was merged at commit c76c5ad0dc9de1c966443bd946fafc6351f87587. Possible workarounds include deploying the patched contracts and pointing DNSSECImpl.setAlgorithm to the deployed contract.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/22xxx/CVE-2026-22866.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-347"
    ]
}
References

Affected packages

Git / github.com/ensdomains/ens-contracts

Affected ranges

Type
GIT
Repo
https://github.com/ensdomains/ens-contracts
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other
networks/goerli
networks/ropsten
v.*
v.1.1.1-testnet
v0.*
v0.0.19
v0.0.5
v0.0.8
v0.1
v1.*
v1.0
v1.0-testnet
v1.0.1-testnet
v1.1-testnet
v1.1.1
v1.1.1-testnet
v1.1.2-testnet
v1.1.3
v1.1.3-testnet
v1.1.4
v1.1.4-RC0
v1.1.4-RC1
v1.1.4-holesky
v1.1.4-testnet
v1.1.5
v1.1.5-testnet
v1.1.6
v1.1.6-testnet
v1.4.0
v1.5.1
v1.5.2
v1.6.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-22866.json"