CVE-2023-26557: IO FinNet tss-lib vulnerable to timing attack from non-constant time scalar arithmetic
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.30527%
CWE
Published
4/21/2023
Updated
2/5/2025
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/bnb-chain/tss-lib | go | < 1.3.6-0.20230324145555-bb6fb30bd3eb | 1.3.6-0.20230324145555-bb6fb30bd3eb |
github.com/binance-chain/tss-lib | go | < 1.3.6-0.20230324145555-bb6fb30bd3eb | 1.3.6-0.20230324145555-bb6fb30bd3eb |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from using Go's non-constant time big.Int operations in cryptographic primitives. The paillier.go file is explicitly called out as containing an example leak. The Paillier cryptosystem implementation relies heavily on modular exponentiation and inverse operations for encryption/decryption, which when implemented with variable-time arithmetic (big.Int.Exp, big.Int.ModInverse) would leak timing information about the private lambda parameter. Key generation involving prime comparisons (Cmp) and lambda calculation would similarly leak timing information. The high confidence comes from the vulnerability description explicitly linking these operations to the side-channel leak.