Miggo Logo

CVE-2022-31021:
Breaking unlinkability in Identity Mixer using malicious keys

3.3

CVSS Score

Basic Information

EPSS Score
-
Published
1/16/2024
Updated
1/19/2024
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
anoncreds-clsignaturesrust< 0.3
ursarust<= 0.3.7

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from a missing protocol-level key correctness proof rather than specific flawed functions in the codebase. The original implementations (Ursa and AnonCreds) correctly generate safe primes, but the specification allows malicious issuers to implement custom key generation without proper prime validation. No specific functions are identified because:

  1. The advisory doesn't list vulnerable functions
  2. The core issue is a missing ZK proof requirement in the protocol
  3. The existing implementations' key generation functions are actually correct
  4. Vulnerability manifests in adversarial implementations, not the original code

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

# *L Si*n*tur*s Issu*r K*y *orr**tn*ss Proo* l**ks o* prim* str*n*t* ****kin* * w**kn*ss in t** *yp*rl****r *non*r**s sp**i*i**tion t**t is not miti**t** in t** Urs* *n* *non*r**s impl*m*nt*tions is t**t t** Issu*r *o*s not pu*lis* * k*y *orr**tn*ss

Reasoning

T** vuln*r**ility st*ms *rom * missin* proto*ol-l*v*l k*y *orr**tn*ss proo* r*t**r t**n sp**i*i* *l*w** *un*tions in t** *o****s*. T** ori*in*l impl*m*nt*tions (Urs* *n* *non*r**s) *orr**tly **n*r*t* s*** prim*s, *ut t** sp**i*i**tion *llows m*li*iou