CVE-2023-33241

Crypto wallets implementing the GG18 or GG20 TSS protocol might allow an attacker to extract a full ECDSA private key by injecting a malicious pallier key and cheating in the range proof. Depending on the Beta parameters chosen in the protocol implementation, the attack might require 16 signatures or more fully exfiltrate the other parties' private key shares.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gg18_project:gg18:-:*:*:*:*:*:*:*
cpe:2.3:a:gg20_project:gg20:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:05

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.1
v2 : unknown
v3 : 9.6
References () https://eprint.iacr.org/2019/114.pdf - Exploit, Third Party Advisory () https://eprint.iacr.org/2019/114.pdf - Exploit, Third Party Advisory
References () https://eprint.iacr.org/2020/540.pdf - Exploit, Third Party Advisory () https://eprint.iacr.org/2020/540.pdf - Exploit, Third Party Advisory
References () https://github.com/fireblocks-labs/mpc-ecdsa-attacks-23 - Exploit () https://github.com/fireblocks-labs/mpc-ecdsa-attacks-23 - Exploit
References () https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc - Exploit () https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc - Exploit
References () https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/ - Third Party Advisory () https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/ - Third Party Advisory

25 Aug 2023, 16:14

Type Values Removed Values Added
References (MISC) https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/ - (MISC) https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/ - Third Party Advisory
References (MISC) https://github.com/fireblocks-labs/mpc-ecdsa-attacks-23 - (MISC) https://github.com/fireblocks-labs/mpc-ecdsa-attacks-23 - Exploit
References (MISC) https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc - (MISC) https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc - Exploit
References (MISC) https://eprint.iacr.org/2020/540.pdf - (MISC) https://eprint.iacr.org/2020/540.pdf - Exploit, Third Party Advisory
References (MISC) https://eprint.iacr.org/2019/114.pdf - (MISC) https://eprint.iacr.org/2019/114.pdf - Exploit, Third Party Advisory
CPE cpe:2.3:a:gg18_project:gg18:-:*:*:*:*:*:*:*
cpe:2.3:a:gg20_project:gg20:-:*:*:*:*:*:*:*
CWE CWE-74
First Time Gg18 Project
Gg20 Project
Gg20 Project gg20
Gg18 Project gg18
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1

09 Aug 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-09 22:15

Updated : 2024-11-21 08:05


NVD link : CVE-2023-33241

Mitre link : CVE-2023-33241

CVE.ORG link : CVE-2023-33241


JSON object : View

Products Affected

gg20_project

  • gg20

gg18_project

  • gg18
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')