Crypto wallets implementing the GG18 or GG20 TSS protocol might allow an attacker to extract a full ECDSA private key by injecting a malicious pallier key and cheating in the range proof. Depending on the Beta parameters chosen in the protocol implementation, the attack might require 16 signatures or more fully exfiltrate the other parties' private key shares.
References
Link | Resource |
---|---|
https://eprint.iacr.org/2019/114.pdf | Exploit Third Party Advisory |
https://eprint.iacr.org/2020/540.pdf | Exploit Third Party Advisory |
https://github.com/fireblocks-labs/mpc-ecdsa-attacks-23 | Exploit |
https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc | Exploit |
https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-08-09 22:15
Updated : 2023-08-25 16:14
NVD link : CVE-2023-33241
Mitre link : CVE-2023-33241
CVE.ORG link : CVE-2023-33241
JSON object : View
Products Affected
gg18_project
- gg18
gg20_project
- gg20
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')