CGGMP24 is a state-of-art ECDSA TSS protocol that supports 1-round signing (requires 3 preprocessing rounds), identifiable abort, and a key refresh protocol. Prior to version 0.6.3, there is a missing check in the ZK proof that enables an attack in which single malicious signer can reconstruct full private key. This issue has been patched in version 0.6.3, for full mitigation it is recommended to upgrade to cggmp24 version 0.7.0-alpha.2 as it contains more security checks.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-m95p-425x-x889 cggmp21 has a missing check in the ZK proof used in CGGMP21
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 28 Nov 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Lfdt-lockness
Lfdt-lockness cggmp24
Vendors & Products Lfdt-lockness
Lfdt-lockness cggmp24

Tue, 25 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 25 Nov 2025 20:00:00 +0000

Type Values Removed Values Added
Description CGGMP24 is a state-of-art ECDSA TSS protocol that supports 1-round signing (requires 3 preprocessing rounds), identifiable abort, and a key refresh protocol. Prior to version 0.6.3, there is a missing check in the ZK proof that enables an attack in which single malicious signer can reconstruct full private key. This issue has been patched in version 0.6.3, for full mitigation it is recommended to upgrade to cggmp24 version 0.7.0-alpha.2 as it contains more security checks.
Title CGGMP24 is missing a check in the ZK proof used in CGGMP21
Weaknesses CWE-345
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-11-25T20:57:34.072Z

Reserved: 2025-11-21T01:08:02.612Z

Link: CVE-2025-66016

cve-icon Vulnrichment

Updated: 2025-11-25T20:55:11.400Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-25T20:16:00.640

Modified: 2025-11-25T22:16:16.690

Link: CVE-2025-66016

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-28T08:51:29Z

Weaknesses