Crypto wallets implementing the Lindell17 TSS protocol might allow an attacker to extract the full ECDSA private key by exfiltrating a single bit in every signature attempt (256 in total) because of not adhering to the paper's security proof's assumption regarding handling aborts after a failed signature.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
https://www.fireblocks.com/blog/lindell17-abort-vulnerability-technical-report/ | third party advisory |
https://github.com/fireblocks-labs/mpc-ecdsa-attacks-23 | exploit |
https://github.com/fireblocks-labs/zengo-lindell17-exploit-poc | exploit |
https://eprint.iacr.org/2017/552.pdf | third party advisory exploit |