Vulnerabilities > CVE-2023-26556 - Information Exposure Through Discrepancy vulnerability in Iofinnet Tss-Lib
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
NONE Summary
io.finnet tss-lib before 2.0.0 can leak a secret key via a timing side-channel attack because it relies on the scalar-multiplication implementation in Go crypto/elliptic, which is not constant time (there is an if statement in a loop). One leak is in ecdsa/keygen/round_2.go. (bnb-chain/tss-lib and thorchain/tss are also affected.)
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
References
- https://github.com/bnb-chain/tss-lib/tree/v1.3.5
- https://github.com/bnb-chain/tss-lib/tree/v1.3.5
- https://github.com/IoFinnet/tss-lib/releases/tag/v2.0.0
- https://github.com/IoFinnet/tss-lib/releases/tag/v2.0.0
- https://gitlab.com/thorchain/tss/tss-lib/-/tags/v0.1.3
- https://gitlab.com/thorchain/tss/tss-lib/-/tags/v0.1.3
- https://medium.com/%40iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b
- https://medium.com/%40iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b