Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m95p-425x-x889 | cggmp21 has a missing check in the ZK proof used in CGGMP21 |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 28 Nov 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lfdt-lockness
Lfdt-lockness cggmp24 |
|
| Vendors & Products |
Lfdt-lockness
Lfdt-lockness cggmp24 |
Tue, 25 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 25 Nov 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CGGMP24 is a state-of-art ECDSA TSS protocol that supports 1-round signing (requires 3 preprocessing rounds), identifiable abort, and a key refresh protocol. Prior to version 0.6.3, there is a missing check in the ZK proof that enables an attack in which single malicious signer can reconstruct full private key. This issue has been patched in version 0.6.3, for full mitigation it is recommended to upgrade to cggmp24 version 0.7.0-alpha.2 as it contains more security checks. | |
| Title | CGGMP24 is missing a check in the ZK proof used in CGGMP21 | |
| Weaknesses | CWE-345 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-25T20:57:34.072Z
Reserved: 2025-11-21T01:08:02.612Z
Link: CVE-2025-66016
Updated: 2025-11-25T20:55:11.400Z
Status : Awaiting Analysis
Published: 2025-11-25T20:16:00.640
Modified: 2025-11-25T22:16:16.690
Link: CVE-2025-66016
No data.
OpenCVE Enrichment
Updated: 2025-11-28T08:51:29Z
Github GHSA