CVE-2025-66016
BaseFortify
Publication date: 2025-11-25
Last updated on: 2025-11-25
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cggmp24 | cggmp24 | 0.7.0-alpha.2 |
| cggmp24 | cggmp24 | 0.6.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-345 | The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in CGGMP24 versions prior to 0.6.3, where a missing check in the zero-knowledge (ZK) proof allows a single malicious signer to reconstruct the full private key. CGGMP24 is an ECDSA threshold signature scheme (TSS) protocol, and this flaw compromises the security of the private key used in signing operations. The issue has been patched in version 0.6.3, with further security improvements in version 0.7.0-alpha.2.
How can this vulnerability impact me? :
If exploited, this vulnerability allows a single malicious participant in the CGGMP24 protocol to reconstruct the entire private key, potentially enabling unauthorized signing of transactions or messages. This compromises the confidentiality and integrity of cryptographic operations relying on the private key, leading to severe security breaches.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade CGGMP24 to version 0.6.3 or later. For full mitigation, it is recommended to upgrade to version 0.7.0-alpha.2 as it contains additional security checks.