First published: Fri Apr 21 2023(Updated: )
An issue was discovered in IO FinNet tss-lib before 2.0.0. The parameter ssid for defining a session id is not used through the MPC implementation, which makes replaying and spoofing of messages easier. In particular, the Schnorr proof of knowledge implemented in sch.go does not utilize a session id, context, or random nonce in the generation of the challenge. This could allow a malicious user or an eavesdropper to replay a valid proof sent in the past.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/binance-chain/tss-lib | <2.0.0 | 2.0.0 |
go/github.com/bnb-chain/tss-lib | <2.0.0 | 2.0.0 |
Binance TSS-lib | <2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-47930 has been identified as a medium severity vulnerability due to its potential for message replay and spoofing.
To fix CVE-2022-47930, update the tss-lib library to version 2.0.0 or later.
The impact of CVE-2022-47930 includes the ability to replay and spoof messages due to a missing session ID in the MPC implementation.
Versions of tss-lib prior to 2.0.0 are affected by CVE-2022-47930.
Additional information about CVE-2022-47930 can be found in security disclosure articles from the developers.