CVE-2023-33241
CVSS V2 None
CVSS V3 None
Description
Crypto wallets implementing the GG18 or GG20 TSS protocol might allow an attacker to extract a full ECDSA private key by injecting a malicious pallier key and cheating in the range proof. Depending on the Beta parameters chosen in the protocol implementation, the attack might require 16 signatures or more fully exfiltrate the other parties' private key shares.
Overview
- CVE ID
- CVE-2023-33241
- Assigner
- disclosures@halborn.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-08-09T22:15:10
- Last Modified Date
- 2023-08-25T16:14:33
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:gg18_project:gg18:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gg20_project:gg20:-:*:*:*:*:*:*:* | 1 | OR |
References
Reference URL | Reference Tags |
---|---|
https://eprint.iacr.org/2019/114.pdf | Exploit Third Party Advisory |
https://eprint.iacr.org/2020/540.pdf | Exploit Third Party Advisory |
https://github.com/fireblocks-labs/mpc-ecdsa-attacks-23 | Exploit |
https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc | Exploit |
https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/ | Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-33241 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33241 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-09-06 03:25:11 | Added to TrackCVE | |||
2023-09-06 03:25:13 | Weakness Enumeration | new |