CVE-2023-33241

Crypto wallets implementing the GG18 or GG20 TSS protocol might allow an attacker to extract a full ECDSA private key by injecting a malicious pallier key and cheating in the range proof. Depending on the Beta parameters chosen in the protocol implementation, the attack might require 16 signatures or more fully exfiltrate the other parties' private key shares.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gg18_project:gg18:-:*:*:*:*:*:*:*
cpe:2.3:a:gg20_project:gg20:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:05

Type Values Removed Values Added
References () https://eprint.iacr.org/2019/114.pdf - Exploit, Third Party Advisory () https://eprint.iacr.org/2019/114.pdf - Exploit, Third Party Advisory
References () https://eprint.iacr.org/2020/540.pdf - Exploit, Third Party Advisory () https://eprint.iacr.org/2020/540.pdf - Exploit, Third Party Advisory
References () https://github.com/fireblocks-labs/mpc-ecdsa-attacks-23 - Exploit () https://github.com/fireblocks-labs/mpc-ecdsa-attacks-23 - Exploit
References () https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc - Exploit () https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc - Exploit
References () https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/ - Third Party Advisory () https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/ - Third Party Advisory
CVSS v2 : unknown
v3 : 9.1
v2 : unknown
v3 : 9.6

25 Aug 2023, 16:14

Type Values Removed Values Added
CPE cpe:2.3:a:gg18_project:gg18:-:*:*:*:*:*:*:*
cpe:2.3:a:gg20_project:gg20:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
CWE CWE-74
First Time Gg20 Project gg20
Gg18 Project
Gg18 Project gg18
Gg20 Project
References (MISC) https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc - (MISC) https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc - Exploit
References (MISC) https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/ - (MISC) https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/ - Third Party Advisory
References (MISC) https://eprint.iacr.org/2020/540.pdf - (MISC) https://eprint.iacr.org/2020/540.pdf - Exploit, Third Party Advisory
References (MISC) https://github.com/fireblocks-labs/mpc-ecdsa-attacks-23 - (MISC) https://github.com/fireblocks-labs/mpc-ecdsa-attacks-23 - Exploit
References (MISC) https://eprint.iacr.org/2019/114.pdf - (MISC) https://eprint.iacr.org/2019/114.pdf - Exploit, Third Party Advisory

09 Aug 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-09 22:15

Updated : 2024-11-21 08:05


NVD link : CVE-2023-33241

Mitre link : CVE-2023-33241

CVE.ORG link : CVE-2023-33241


JSON object : View

Products Affected

gg18_project

  • gg18

gg20_project

  • gg20
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')