Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1437 | An issue was discovered in IO FinNet tss-lib before 2.0.0. The parameter ssid for defining a session id is not used through the MPC implementation, which makes replaying and spoofing of messages easier. In particular, the Schnorr proof of knowledge implemented in sch.go does not utilize a session id, context, or random nonce in the generation of the challenge. This could allow a malicious user or an eavesdropper to replay a valid proof sent in the past. |
Github GHSA |
GHSA-c58h-qv6g-fw74 | IO FinNet tss-lib vulnerable to replay attacks involving proofs |
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 05 Feb 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-05T14:50:01.991Z
Reserved: 2022-12-22T00:00:00.000Z
Link: CVE-2022-47930
Updated: 2024-08-03T15:02:36.581Z
Status : Modified
Published: 2023-04-21T18:15:07.377
Modified: 2025-02-05T15:15:15.867
Link: CVE-2022-47930
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA