6.8
CVSSv3

CVE-2020-28498

Published: 02/02/2021 Updated: 08/02/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.8 | Impact Score: 4 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The package elliptic prior to 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

elliptic project elliptic

Github Repositories

In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values ​​and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .

Twist Attack Tutorial: youtube/S_ZUcM2cD8I Tutorial: cryptodeeptechru/twist-attack Not so long ago, the elliptic (654) package for standard elliptic curves was vulnerable to various attacks , one of which is the Twist Attack  The cryptographic problem was in the implementation of secp256