cve/2023/CVE-2023-26556.md

18 lines
864 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-26556](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26556)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
io.finnet tss-lib before 2.0.0 can leak a secret key via a timing side-channel attack because it relies on the scalar-multiplication implementation in Go crypto/elliptic, which is not constant time (there is an if statement in a loop). One leak is in ecdsa/keygen/round_2.go. (bnb-chain/tss-lib and thorchain/tss are also affected.)
### POC
#### Reference
- https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b
#### Github
No PoCs found on GitHub currently.