First published: Fri Apr 21 2023(Updated: )
io.finnet tss-lib before 2.0.0 can leak a secret key via a timing side-channel attack because it relies on the scalar-multiplication implementation in Go crypto/elliptic, which is not constant time (there is an if statement in a loop). One leak is in ecdsa/keygen/round_2.go. (bnb-chain/tss-lib and thorchain/tss are also affected.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/binance-chain/tss-lib | <2.0.0 | 2.0.0 |
go/github.com/bnb-chain/tss-lib | <2.0.0 | 2.0.0 |
Binance TSS-lib | <2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26556 is considered a high severity vulnerability due to the potential leak of secret keys through a timing side-channel attack.
To fix CVE-2023-26556, upgrade to tss-lib version 2.0.0 or later, which addresses the timing vulnerability.
CVE-2023-26556 affects versions of tss-lib prior to 2.0.0 from the repositories maintained by io.finnet and bnb-chain.
CVE-2023-26556 is associated with a timing side-channel attack that can leak secret keys.
CVE-2023-26556 occurs due to the reliance on non-constant time scalar multiplication in the Go crypto/elliptic package.