Crypto wallets implementing the GG18 or GG20 TSS protocol might allow an attacker to extract a full ECDSA private key by injecting a malicious pallier key and cheating in the range proof. Depending on the Beta parameters chosen in the protocol implementation, the attack might require 16 signatures or more fully exfiltrate the other parties' private key shares.
References
Link | Resource |
---|---|
https://eprint.iacr.org/2019/114.pdf | Exploit Third Party Advisory |
https://eprint.iacr.org/2020/540.pdf | Exploit Third Party Advisory |
https://github.com/fireblocks-labs/mpc-ecdsa-attacks-23 | Exploit |
https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc | Exploit |
https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/ | Third Party Advisory |
https://eprint.iacr.org/2019/114.pdf | Exploit Third Party Advisory |
https://eprint.iacr.org/2020/540.pdf | Exploit Third Party Advisory |
https://github.com/fireblocks-labs/mpc-ecdsa-attacks-23 | Exploit |
https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc | Exploit |
https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://eprint.iacr.org/2019/114.pdf - Exploit, Third Party Advisory | |
References | () https://eprint.iacr.org/2020/540.pdf - Exploit, Third Party Advisory | |
References | () https://github.com/fireblocks-labs/mpc-ecdsa-attacks-23 - Exploit | |
References | () https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc - Exploit | |
References | () https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/ - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.6 |
25 Aug 2023, 16:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gg18_project:gg18:-:*:*:*:*:*:*:* cpe:2.3:a:gg20_project:gg20:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
CWE | CWE-74 | |
First Time |
Gg20 Project gg20
Gg18 Project Gg18 Project gg18 Gg20 Project |
|
References | (MISC) https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc - Exploit | |
References | (MISC) https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/ - Third Party Advisory | |
References | (MISC) https://eprint.iacr.org/2020/540.pdf - Exploit, Third Party Advisory | |
References | (MISC) https://github.com/fireblocks-labs/mpc-ecdsa-attacks-23 - Exploit | |
References | (MISC) https://eprint.iacr.org/2019/114.pdf - Exploit, Third Party Advisory |
09 Aug 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-09 22:15
Updated : 2024-11-21 08:05
NVD link : CVE-2023-33241
Mitre link : CVE-2023-33241
CVE.ORG link : CVE-2023-33241
JSON object : View
Products Affected
gg18_project
- gg18
gg20_project
- gg20
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')