Vulnerability Details : CVE-2023-33241
Potential exploit
Crypto wallets implementing the GG18 or GG20 TSS protocol might allow an attacker to extract a full ECDSA private key by injecting a malicious pallier key and cheating in the range proof. Depending on the Beta parameters chosen in the protocol implementation, the attack might require 16 signatures or more fully exfiltrate the other parties' private key shares.
Products affected by CVE-2023-33241
- cpe:2.3:a:gg18_project:gg18:-:*:*:*:*:*:*:*
- cpe:2.3:a:gg20_project:gg20:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-33241
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-33241
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.6
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N |
3.1
|
5.8
|
Halborn | |
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
3.9
|
5.2
|
NIST |
CWE ids for CVE-2023-33241
-
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-33241
-
https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/
GG18 and GG20 Paillier Key Vulnerability [CVE-2023-33241]: Technical Report - FireblocksThird Party Advisory
-
https://eprint.iacr.org/2020/540.pdf
Exploit;Third Party Advisory
-
https://github.com/fireblocks-labs/mpc-ecdsa-attacks-23
GitHub - fireblocks-labs/mpc-ecdsa-attacks-23Exploit
-
https://eprint.iacr.org/2019/114.pdf
Exploit;Third Party Advisory
-
https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc
GitHub - fireblocks-labs/safeheron-gg20-exploit-pocExploit
Jump to