IO FinNet tss-lib vulnerable to replay attacks involving proofs
Moderate severity
GitHub Reviewed
Published
Apr 21, 2023
to the GitHub Advisory Database
•
Updated Feb 5, 2025
Description
Published by the National Vulnerability Database
Apr 21, 2023
Published to the GitHub Advisory Database
Apr 21, 2023
Reviewed
Feb 5, 2025
Last updated
Feb 5, 2025
An issue was discovered in IO FinNet tss-lib before 2.0.0. The parameter ssid for defining a session id is not used through the MPC implementation, which makes replaying and spoofing of messages easier. In particular, the Schnorr proof of knowledge implemented in sch.go does not utilize a session id, context, or random nonce in the generation of the challenge. This could allow a malicious user or an eavesdropper to replay a valid proof sent in the past.
References