Логотип exploitDog
bind:CVE-2022-47930
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-47930

Количество 3

Количество 3

nvd логотип

CVE-2022-47930

почти 3 года назад

An issue was discovered in IO FinNet tss-lib before 2.0.0. The parameter ssid for defining a session id is not used through the MPC implementation, which makes replaying and spoofing of messages easier. In particular, the Schnorr proof of knowledge implemented in sch.go does not utilize a session id, context, or random nonce in the generation of the challenge. This could allow a malicious user or an eavesdropper to replay a valid proof sent in the past.

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-c58h-qv6g-fw74

почти 3 года назад

IO FinNet tss-lib vulnerable to replay attacks involving proofs

CVSS3: 6.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0429-1

12 месяцев назад

Security update for govulncheck-vulndb

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-47930

An issue was discovered in IO FinNet tss-lib before 2.0.0. The parameter ssid for defining a session id is not used through the MPC implementation, which makes replaying and spoofing of messages easier. In particular, the Schnorr proof of knowledge implemented in sch.go does not utilize a session id, context, or random nonce in the generation of the challenge. This could allow a malicious user or an eavesdropper to replay a valid proof sent in the past.

CVSS3: 6.8
0%
Низкий
почти 3 года назад
github логотип
GHSA-c58h-qv6g-fw74

IO FinNet tss-lib vulnerable to replay attacks involving proofs

CVSS3: 6.8
0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2025:0429-1

Security update for govulncheck-vulndb

12 месяцев назад

Уязвимостей на страницу