Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8frv-q972-9rq5 | cggmp24 and cggmp21 are vulnerable to signature forgery through altered presignatures |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 27 Nov 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lfdt-lockness
Lfdt-lockness cggmp21 |
|
| Vendors & Products |
Lfdt-lockness
Lfdt-lockness cggmp21 |
Tue, 25 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 25 Nov 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV4_0
|
cvssV4_0
|
Tue, 25 Nov 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CGGMP24 is a state-of-art ECDSA TSS protocol that supports 1-round signing (requires 3 preprocessing rounds), identifiable abort, and a key refresh protocol. In versions 0.6.3 and prior of cggmp21 and version 0.7.0-alpha.1 of cggmp24, presignatures can be used in the way that significantly reduces security. cggmp24 version 0.7.0-alpha.2 release contains API changes that make it impossible to use presignatures in contexts in which it reduces security. | |
| Title | CGGMP21 presignatures can be used in the way that significantly reduces security | |
| Weaknesses | CWE-327 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-25T20:48:35.800Z
Reserved: 2025-11-21T01:08:02.613Z
Link: CVE-2025-66017
Updated: 2025-11-25T20:47:11.741Z
Status : Awaiting Analysis
Published: 2025-11-25T20:16:00.850
Modified: 2025-11-25T22:16:16.690
Link: CVE-2025-66017
No data.
OpenCVE Enrichment
Updated: 2025-11-27T09:45:47Z
Github GHSA