Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/bnb-chain/tss-lib/ecdsa/keygen
to version 2.0.0 or higher.
github.com/bnb-chain/tss-lib/ecdsa/keygen is a Threshold Signature Scheme, for ECDSA and EDDSA
Affected versions of this package are vulnerable to Information Exposure when the Paillier modulus N
is constructed with small factors (less than 2^100). An attacker can interact with other participants in the signing protocol to steal their secret key shares within as few as sixteen signing attempts, subsequently reconstructing the master key from these shares.
NOTE: This vulnerability is addressed in version 2.0.0. The maintainers recommend upgrading all packages and wallets to avoid security issues.