Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8frv-q972-9rq5 | cggmp24 and cggmp21 are vulnerable to signature forgery through altered presignatures |
Thu, 27 Nov 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lfdt-lockness
Lfdt-lockness cggmp21 |
|
| Vendors & Products |
Lfdt-lockness
Lfdt-lockness cggmp21 |
Tue, 25 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 25 Nov 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV4_0
|
cvssV4_0
|
Tue, 25 Nov 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CGGMP24 is a state-of-art ECDSA TSS protocol that supports 1-round signing (requires 3 preprocessing rounds), identifiable abort, and a key refresh protocol. In versions 0.6.3 and prior of cggmp21 and version 0.7.0-alpha.1 of cggmp24, presignatures can be used in the way that significantly reduces security. cggmp24 version 0.7.0-alpha.2 release contains API changes that make it impossible to use presignatures in contexts in which it reduces security. | |
| Title | CGGMP21 presignatures can be used in the way that significantly reduces security | |
| Weaknesses | CWE-327 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-25T20:48:35.800Z
Reserved: 2025-11-21T01:08:02.613Z
Link: CVE-2025-66017
Updated: 2025-11-25T20:47:11.741Z
Status : Deferred
Published: 2025-11-25T20:16:00.850
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-66017
No data.
OpenCVE Enrichment
Updated: 2025-11-27T09:45:47Z
Github GHSA