Crypto wallets implementing the GG18 or GG20 TSS protocol might allow an attacker to extract a full ECDSA private key by injecting a malicious pallier key and cheating in the range proof. Depending on the Beta parameters chosen in the protocol implementation, the attack might require 16 signatures or more fully exfiltrate the other parties' private key shares.
Metrics
Affected Vendors & Products
References
History
Thu, 10 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Halborn
Published: 2023-08-09T21:00:20.582Z
Updated: 2024-10-10T14:37:44.417Z
Reserved: 2023-05-19T15:51:23.095Z
Link: CVE-2023-33241
Vulnrichment
Updated: 2024-08-02T15:39:36.145Z
NVD
Status : Modified
Published: 2023-08-09T22:15:10.323
Modified: 2024-11-21T08:05:13.413
Link: CVE-2023-33241
Redhat
No data.