Improper Verification of Cryptographic Signature Affecting anoncreds-clsignatures package, versions >=0.0.0


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (19th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-ANONCREDSCLSIGNATURES-6164731
  • published17 Jan 2024
  • disclosed16 Jan 2024
  • creditUnknown

Introduced: 16 Jan 2024

CVE-2022-31021  (opens in a new tab)
CWE-347  (opens in a new tab)

How to fix?

Upgrade anoncreds-clsignatures to version or higher.

Overview

Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature due to the lack of prime strength checking in the `CL Signatures Issuer Key Correctness Proofa. An attacker can undermine the unlinkability guarantees of AnonCreds by using a maliciously generated private key that does not meet the required strength, allowing the attacker to potentially link credential presentations to individual holders. This is only exploitable if the issuer generates a private key that does not conform to the safe prime requirements and if verifiers collude with the issuer.

Workaround

This vulnerability can be mitigated by issuers providing a key correctness proof that demonstrates the generation of a sufficiently strong private key, as outlined in the referenced academic paper.

References

CVSS Scores

version 3.1