Description
Crypto wallets implementing the GG18 or GG20 TSS protocol might allow an attacker to extract a full ECDSA private key by injecting a malicious pallier key and cheating in the range proof. Depending on the Beta parameters chosen in the protocol implementation, the attack might require 16 signatures or more fully exfiltrate the other parties' private key shares.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-37410 | Crypto wallets implementing the GG18 or GG20 TSS protocol might allow an attacker to extract a full ECDSA private key by injecting a malicious pallier key and cheating in the range proof. Depending on the Beta parameters chosen in the protocol implementation, the attack might require 16 signatures or more fully exfiltrate the other parties' private key shares. |
References
History
Thu, 10 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Halborn
Published:
Updated: 2024-10-10T14:37:44.417Z
Reserved: 2023-05-19T15:51:23.095Z
Link: CVE-2023-33241
Updated: 2024-08-02T15:39:36.145Z
Status : Modified
Published: 2023-08-09T22:15:10.323
Modified: 2024-11-21T08:05:13.413
Link: CVE-2023-33241
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD