CGGMP24 is a state-of-art ECDSA TSS protocol that supports 1-round signing (requires 3 preprocessing rounds), identifiable abort, and a key refresh protocol. Prior to version 0.6.3, there is a missing check in the ZK proof that enables an attack in which single malicious signer can reconstruct full private key. This issue has been patched in version 0.6.3, for full mitigation it is recommended to upgrade to cggmp24 version 0.7.0-alpha.2 as it contains more security checks.
History

Tue, 25 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 25 Nov 2025 20:00:00 +0000

Type Values Removed Values Added
Description CGGMP24 is a state-of-art ECDSA TSS protocol that supports 1-round signing (requires 3 preprocessing rounds), identifiable abort, and a key refresh protocol. Prior to version 0.6.3, there is a missing check in the ZK proof that enables an attack in which single malicious signer can reconstruct full private key. This issue has been patched in version 0.6.3, for full mitigation it is recommended to upgrade to cggmp24 version 0.7.0-alpha.2 as it contains more security checks.
Title CGGMP24 is missing a check in the ZK proof used in CGGMP21
Weaknesses CWE-345
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-25T19:48:16.483Z

Updated: 2025-11-25T20:57:34.072Z

Reserved: 2025-11-21T01:08:02.612Z

Link: CVE-2025-66016

cve-icon Vulnrichment

Updated: 2025-11-25T20:55:11.400Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-25T20:16:00.640

Modified: 2025-11-25T22:16:16.690

Link: CVE-2025-66016

cve-icon Redhat

No data.