CVE-2022-47930

Source
https://cve.org/CVERecord?id=CVE-2022-47930
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-47930.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-47930
Aliases
Downstream
Related
Published
2023-04-21T18:15:07.377Z
Modified
2026-03-14T11:55:55.508907Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in IO FinNet tss-lib before 2.0.0. The parameter ssid for defining a session id is not used through the MPC implementation, which makes replaying and spoofing of messages easier. In particular, the Schnorr proof of knowledge implemented in sch.go does not utilize a session id, context, or random nonce in the generation of the challenge. This could allow a malicious user or an eavesdropper to replay a valid proof sent in the past.

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "2.0.0"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-47930.json"