io.finnet tss-lib before 2.0.0 can leak a secret key via a timing side-channel attack because it relies on the scalar-multiplication implementation in Go crypto/elliptic, which is not constant time (there is an if statement in a loop). One leak is in ecdsa/keygen/round_2.go. (bnb-chain/tss-lib and thorchain/tss are also affected.)
References
Configurations
History
02 May 2023, 17:05
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-203 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
CPE | cpe:2.3:a:iofinnet:tss-lib:*:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/IoFinnet/tss-lib/releases/tag/v2.0.0 - Release Notes | |
References | (MISC) https://github.com/bnb-chain/tss-lib/tree/v1.3.5 - Product | |
References | (MISC) https://gitlab.com/thorchain/tss/tss-lib/-/tags/v0.1.3 - Release Notes | |
References | (MISC) https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b - Not Applicable, Third Party Advisory |
21 Apr 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-21 18:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-26556
Mitre link : CVE-2023-26556
CVE.ORG link : CVE-2023-26556
JSON object : View
Products Affected
iofinnet
- tss-lib
CWE
CWE-203
Observable Discrepancy