Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2026-32614
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Go ShangMi SM9 Infinity-Point Ciphertext Forgery Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Go ShangMi (Commercial Cryptography) Library (GMSM) is a cryptographic library that covers the Chinese commercial cryptographic public algorithms SM2/SM3/SM4/SM9/ZUC. Prior to 0.41.1, the current SM9 decryption implementation contains an infinity-point ciphertext forgery vulnerability. The root cause is that, during decryption, the elliptic-curve point C1 in the ciphertext is only deserialized and checked to be on the curve, but the implementation does not explicitly reject the point at infinity. In the current implementation, an attacker can construct C1 as the point at infinity, causing the bilinear pairing result to degenerate into the identity element in the GT group. As a result, a critical part of the key derivation input becomes a predictable constant. An attacker who only knows the target user's UID can derive the decryption key material and then forge a ciphertext that passes the integrity check. This vulnerability is fixed in 0.41.1.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
密码学签名的验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
gmsm 数据伪造问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
gmsm是Sun Yimin个人开发者的一个Go语言实现的商用密码算法库。 GMSM 0.41.1之前版本存在数据伪造问题漏洞,该漏洞源于SM9解密实现中存在无穷远点密文伪造漏洞,椭圆曲线点C1在解密时仅被反序列化并检查是否在曲线上,但未明确拒绝无穷远点,可能导致攻击者仅知道目标用户UID即可派生解密密钥材料并伪造通过完整性检查的密文。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
emmansungmsm < 0.41.1 -
II. Public POCs for CVE-2026-32614
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium
kimi-k2.5 · 7907 chars
Paid plan includes:
In-depth vulnerability mechanism
Trigger conditions & impact
Full executable POC code
Exploit chain & mitigation
POC zip download
100+ AI POC generations per month
III. Intelligence Information for CVE-2026-32614
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2026-32614

No comments yet


Leave a comment