Description
Crypto wallets implementing the Lindell17 TSS protocol might allow an attacker to extract the full ECDSA private key by exfiltrating a single bit in every signature attempt (256 in total) because of not adhering to the paper's security proof's assumption regarding handling aborts after a failed signature.
Published: 2023-08-09
Score: 9.6 Critical
EPSS: 5.8% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-37411 Crypto wallets implementing the Lindell17 TSS protocol might allow an attacker to extract the full ECDSA private key by exfiltrating a single bit in every signature attempt (256 in total) because of not adhering to the paper's security proof's assumption regarding handling aborts after a failed signature.
History

Thu, 10 Oct 2024 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Lindell17 Project Lindell17
cve-icon MITRE

Status: PUBLISHED

Assigner: Halborn

Published:

Updated: 2024-10-10T12:47:35.497Z

Reserved: 2023-05-19T15:51:23.095Z

Link: CVE-2023-33242

cve-icon Vulnrichment

Updated: 2024-08-02T15:39:35.953Z

cve-icon NVD

Status : Modified

Published: 2023-08-09T22:15:11.180

Modified: 2024-11-21T08:05:13.993

Link: CVE-2023-33242

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses