Home

Description

CGGMP24 is a state-of-art ECDSA TSS protocol that supports 1-round signing (requires 3 preprocessing rounds), identifiable abort, and a key refresh protocol. Prior to version 0.6.3, there is a missing check in the ZK proof that enables an attack in which single malicious signer can reconstruct full private key. This issue has been patched in version 0.6.3, for full mitigation it is recommended to upgrade to cggmp24 version 0.7.0-alpha.2 as it contains more security checks.

PUBLISHED Reserved 2025-11-21 | Published 2025-11-25 | Updated 2025-11-25 | Assigner GitHub_M




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-345: Insufficient Verification of Data Authenticity

Product status

< 0.6.3
affected

References

github.com/...ggmp21/security/advisories/GHSA-m95p-425x-x889

www.dfns.co/...cggmp21-vulnerabilities-patched-and-explained

cve.org (CVE-2025-66016)

nvd.nist.gov (CVE-2025-66016)

Download JSON