CVE-2022-31021:
Breaking unlinkability in Identity Mixer using malicious keys
3.3
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
1/16/2024
Updated
1/19/2024
KEV Status
No
Technology
Rust
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
anoncreds-clsignatures | rust | < 0.3 | |
ursa | rust | <= 0.3.7 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from a missing protocol-level key correctness proof rather than specific flawed functions in the codebase. The original implementations (Ursa and AnonCreds) correctly generate safe primes, but the specification allows malicious issuers to implement custom key generation without proper prime validation. No specific functions are identified because:
- The advisory doesn't list vulnerable functions
- The core issue is a missing ZK proof requirement in the protocol
- The existing implementations' key generation functions are actually correct
- Vulnerability manifests in adversarial implementations, not the original code