## Critical DoS Flaw in node-forge 1.3.3: Infinite Loop in `BigInteger.modInverse()` Triggers 100% CPU Hang
A high-severity Denial of Service (DoS) vulnerability has been patched in the widely used `node-forge` cryptography library. The flaw, tracked as CVE-2026-33891, resides in the `BigInteger.modInverse()` function inherited from the bundled jsbn library. When this function is called with a zero value as input, the internal Extended Euclidean Algorithm enters an unreachable exit condition, causing the process to hang indefinitely and consume 100% CPU. This creates a straightforward vector for resource exhaustion attacks against any application or service that uses the vulnerable library.

The vulnerability, rated HIGH severity, was reported by a researcher known as Kr0emer and has been addressed in the newly released node-forge version 1.4.0. The library is a critical dependency for numerous web applications, tools, and services that handle cryptographic operations, including TLS/SSL, digital signatures, and certificate generation. The flaw's simplicity—triggered by a single, specific input—makes it a significant operational risk for unpatched systems.

This security update is a mandatory patch for all downstream projects. The GitHub advisory (GHSA) confirms the fix. Organizations and developers must immediately upgrade their dependencies from node-forge 1.3.3 or earlier to version 1.4.0 to mitigate the risk of service disruption. Failure to patch leaves systems vulnerable to a trivial attack that can cripple application performance and availability.
---
- **Source**: GitHub Issues
- **Sector**: The Lab
- **Tags**: cybersecurity, vulnerability, CVE-2026-33891, DoS, open-source
- **Credibility**: unverified
- **Published**: 2026-03-28 16:27:04
- **ID**: 39172
- **URL**: https://whisperx.ai/en/intel/39172