CVE-2025-66016
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-25

Last updated on: 2025-11-25

Assigner: GitHub, Inc.

Description
CGGMP24 is a state-of-art ECDSA TSS protocol that supports 1-round signing (requires 3 preprocessing rounds), identifiable abort, and a key refresh protocol. Prior to version 0.6.3, there is a missing check in the ZK proof that enables an attack in which single malicious signer can reconstruct full private key. This issue has been patched in version 0.6.3, for full mitigation it is recommended to upgrade to cggmp24 version 0.7.0-alpha.2 as it contains more security checks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-25
Last Modified
2025-11-25
Generated
2026-05-07
AI Q&A
2025-11-25
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
cggmp24 cggmp24 0.7.0-alpha.2
cggmp24 cggmp24 0.6.3
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-345 The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in CGGMP24 versions prior to 0.6.3, where a missing check in the zero-knowledge (ZK) proof allows a single malicious signer to reconstruct the full private key. CGGMP24 is an ECDSA threshold signature scheme (TSS) protocol, and this flaw compromises the security of the private key used in signing operations. The issue has been patched in version 0.6.3, with further security improvements in version 0.7.0-alpha.2.


How can this vulnerability impact me? :

If exploited, this vulnerability allows a single malicious participant in the CGGMP24 protocol to reconstruct the entire private key, potentially enabling unauthorized signing of transactions or messages. This compromises the confidentiality and integrity of cryptographic operations relying on the private key, leading to severe security breaches.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, upgrade CGGMP24 to version 0.6.3 or later. For full mitigation, it is recommended to upgrade to version 0.7.0-alpha.2 as it contains additional security checks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart