Crypto wallets implementing the Lindell17 TSS protocol might allow an attacker to extract the full ECDSA private key by exfiltrating a single bit in every signature attempt (256 in total) because of not adhering to the paper's security proof's assumption regarding handling aborts after a failed signature.
References
Link | Resource |
---|---|
https://eprint.iacr.org/2017/552.pdf | Exploit Third Party Advisory |
https://github.com/fireblocks-labs/mpc-ecdsa-attacks-23 | Exploit |
https://github.com/fireblocks-labs/zengo-lindell17-exploit-poc | Exploit |
https://www.fireblocks.com/blog/lindell17-abort-vulnerability-technical-report/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-08-09 22:15
Updated : 2023-08-25 15:06
NVD link : CVE-2023-33242
Mitre link : CVE-2023-33242
CVE.ORG link : CVE-2023-33242
JSON object : View
Products Affected
lindell17_project
- lindell17
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')