8.1
CWE
327
EPSS
0.091%
Advisory Published
CVE Published
Updated

CVE-2024-21670: CL-Signatures Revocation Scheme in Ursa has flaws that allow a holder to demonstrate non-revocation of a revoked credential

First published: Tue Jan 16 2024(Updated: )

### Summary The revocation schema that is part of the Ursa CL-Signatures implementations has a flaw that could impact the privacy guarantees defined by the AnonCreds verifiable credential model, allowing a malicious holder of a revoked credential to generate a valid Non-Revocation Proof for that credential as part of an AnonCreds presentation. ### Details The revocation schema that is part of the Ursa CL-Signatures implementation has a flaw that could impact the privacy guarantees defined by the AnonCreds verifiable credential model, allowing a malicious holder of a revoked credential to generate a valid Non-Revocation Proof for that credential as part of an AnonCreds presentation. The flaw exists in all CL-Signature versions published from the [Hyperledger Ursa] repository to the [Ursa Rust Crate], and are fixed in all versions published from the [Hyperledger AnonCreds CL-Signatures] repository to the [AnonCreds CL-Signatures Rust Crate]. To exploit the flaw, a holder must update their wallet (agent) software, replacing the Hyperledger Ursa or AnonCreds CL-Signatures library that generates the proof of non-revocation. This may involve, for example, altering an iOS or Android application published in the respective app stores. A mitigation for this flaw is to use the application attestation capabilities (such as the Android "[SafetyNet Attestation API]") offered by the app store vendors to (for example) "help determine whether your servers are interacting with your genuine app running on a genuine Android device." The problem is created in the generation of a revocation registry, prior to issuing any credentials. As such, to eliminate the impact of the flaw, the issued credentials must be re-issued based on a correct revocation registry, generated from a correct implementation, such as [Hyperledger AnonCreds CL-Signatures]. [Hyperledger Ursa]: https://github.com/hyperledger-archives/ursa [Ursa Rust Crate]: https://crates.io/crates/ursa [Hyperledger AnonCreds CL-Signatures]: https://github.com/hyperledger/anoncreds-clsignatures-rs [AnonCreds CL-Signatures Rust Crate]: https://crates.io/crates/anoncreds-clsignatures [SafetyNet Attestation API]: https://developer.android.com/privacy-and-security/safetynet/attestation ### Impact The potential impact is as follows: - A verifier may verify a credential from a holder as being "not revoked" when in fact, the holder's credential has been revoked. ### Mitigation Upgrade libraries/applications using the [Ursa Rust Crate] to any version of the [AnonCreds CL-Signatures Rust Crate]. If your application has issued revocable credentials, once the Issuer library has been upgraded, new revocation registries must be created, and credentials issued from revocation registries created with the the flawed software must be revoked and reissued. A verifier can detect if a holder presents a flawed revocable credential.

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
rust/anoncreds-clsignatures<0.1.0
rust/ursa<=0.3.7
Hyperledger Ursa=0.1.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-21670?

    CVE-2024-21670 has a high severity due to its potential impact on the privacy guarantees of the AnonCreds verifiable credential model.

  • How do I fix CVE-2024-21670?

    To fix CVE-2024-21670, update the affected packages 'anoncreds-clsignatures' to version 0.1.0 or higher and 'ursa' to version 0.3.7 or higher.

  • What types of software are affected by CVE-2024-21670?

    CVE-2024-21670 affects the 'anoncreds-clsignatures' package in versions lower than 0.1.0 and the 'ursa' package in versions up to 0.3.7.

  • Who is impacted by CVE-2024-21670?

    Users and developers utilizing the Hyperledger Ursa library for cryptographic operations are impacted by CVE-2024-21670.

  • What is the nature of the vulnerability in CVE-2024-21670?

    CVE-2024-21670 involves a flaw in the revocation schema that can allow malicious holders of revoked credentials to generate valid Non-Revocation Proofs.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203