NA

CVE-2023-33242

Published: 09/08/2023 Updated: 25/08/2023
CVSS v3 Base Score: 8.1 | Impact Score: 5.2 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Crypto wallets implementing the Lindell17 TSS protocol might allow an malicious user to extract the full ECDSA private key by exfiltrating a single bit in every signature attempt (256 in total) because of not adhering to the paper's security proof's assumption regarding handling aborts after a failed signature.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

lindell17 project lindell17 -

Github Repositories

# Server Abort Error on KillSwitch Event Compromises ECDSA Key Signatures Leaking Bits of ECDSA Keys By Spacebot23 -spacebot@wearhackeronecom Copyright 2024 © Dwayne Hans All Rights Reserved Table of Content I The What - Details of vulnerability in a nutshell II The Where - Components/users affected III The When - Exploit and PoC IV The Why - Reason why the

CVE-2023-33242 PoC

CVE-2023-33242 CVE-2023-33242 PoC The simulated Lindell17 protocol is vulnerable to a bit extraction exploit, allowing an attacker to recover the private key by iteratively extracting individual bits of the key The protocol is designed to generate ECDSA signatures in a client-server model, with each party holding a share of the ECDSA secret key The vulnerability lies in the