Description
The keygen protocol implementation in Binance tss-lib before 1.2.0 allows attackers to generate crafted h1 and h2 parameters in order to compromise a signing round or obtain sensitive information from other parties.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1252 | The keygen protocol implementation in Binance tss-lib before 1.2.0 allows attackers to generate crafted h1 and h2 parameters in order to compromise a signing round or obtain sensitive information from other parties. |
Github GHSA |
GHSA-399h-cmvp-qgx5 | Incorrect Default Permissions in Binance tss-lib |
References
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T11:48:58.523Z
Reserved: 2020-04-23T00:00:00.000Z
Link: CVE-2020-12118
No data.
Status : Modified
Published: 2020-04-23T22:15:12.913
Modified: 2024-11-21T04:59:17.103
Link: CVE-2020-12118
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA