In Development IL ecdh before 0.2.0, an attacker can send an invalid point (not on the curve) as the public key, and obtain the derived shared secret.
References
Link | Resource |
---|---|
https://github.com/developmentil/ecdh/issues/3 | Exploit Issue Tracking |
https://github.com/developmentil/ecdh/issues/3 | Exploit Issue Tracking |
Configurations
History
21 Nov 2024, 07:27
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/developmentil/ecdh/issues/3 - Exploit, Issue Tracking |
Information
Published : 2023-02-24 20:15
Updated : 2025-03-12 16:15
NVD link : CVE-2022-44310
Mitre link : CVE-2022-44310
CVE.ORG link : CVE-2022-44310
JSON object : View
Products Affected
ecdh_project
- ecdh
CWE
CWE-668
Exposure of Resource to Wrong Sphere