Improper Verification of Cryptographic Signature Affecting cryptoadvance.specter package, versions [,0.5.0)
Threat Intelligence
EPSS
0.08% (34th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-CRYPTOADVANCESPECTER-5821414
- published 7 Aug 2023
- disclosed 1 Aug 2023
- credit Unknown
Introduced: 1 Aug 2023
CVE-2020-14199 Open this link in a new tabHow to fix?
Upgrade cryptoadvance.specter
to version 0.5.0 or higher.
Overview
cryptoadvance.specter is an A GUI for Bitcoin Core & Electrum optimised to work with airgapped hardware wallets
Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature in the form of mishandling the signing of a Segwit transaction, such that attackers can trick a user into making two signatures, leading to a huge transaction fee in the BIP-143 protocol.
References
CVSS Scores
version 3.1