Crypto wallets implementing the GG18 or GG20 TSS protocol might allow an attacker to extract a full ECDSA private key by injecting a malicious pallier key and cheating in the range proof. Depending on the Beta parameters chosen in the protocol implementation, the attack might require 16 signatures or more fully exfiltrate the other parties' private key shares.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 10 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Halborn
Published:
Updated: 2024-10-10T14:37:44.417Z
Reserved: 2023-05-19T15:51:23.095Z
Link: CVE-2023-33241

Updated: 2024-08-02T15:39:36.145Z

Status : Modified
Published: 2023-08-09T22:15:10.323
Modified: 2024-11-21T08:05:13.413
Link: CVE-2023-33241

No data.

No data.