CVE-2025-66016

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-66016
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-66016.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-66016
Aliases
Published
2025-11-25T19:48:16.483Z
Modified
2025-12-02T20:19:13.979808Z
Severity
  • 9.3 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
CGGMP24 is missing a check in the ZK proof used in CGGMP21
Details

CGGMP24 is a state-of-art ECDSA TSS protocol that supports 1-round signing (requires 3 preprocessing rounds), identifiable abort, and a key refresh protocol. Prior to version 0.6.3, there is a missing check in the ZK proof that enables an attack in which single malicious signer can reconstruct full private key. This issue has been patched in version 0.6.3, for full mitigation it is recommended to upgrade to cggmp24 version 0.7.0-alpha.2 as it contains more security checks.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-345"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/66xxx/CVE-2025-66016.json"
}
References

Affected packages

Git / github.com/lfdt-lockness/cggmp21

Affected ranges

Type
GIT
Repo
https://github.com/lfdt-lockness/cggmp21
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "0.6.3"
        }
    ]
}

Affected versions

Other

audit-1

cggmp21-keygen-v0.*

cggmp21-keygen-v0.1.0
cggmp21-keygen-v0.3.0
cggmp21-keygen-v0.3.1
cggmp21-keygen-v0.3.2
cggmp21-keygen-v0.4.0
cggmp21-keygen-v0.5.0

key-share-v0.*

key-share-v0.1.0
key-share-v0.2.0
key-share-v0.2.1
key-share-v0.2.2
key-share-v0.2.3
key-share-v0.4.0
key-share-v0.4.1
key-share-v0.4.2
key-share-v0.4.3
key-share-v0.5.0
key-share-v0.5.1
key-share-v0.5.2
key-share-v0.6.0
key-share-v0.6.1

v0.*

v0.1.0
v0.1.1
v0.2.0
v0.2.1
v0.4.0
v0.4.1
v0.4.2
v0.5.0
v0.5.1
v0.5.2
v0.6.0
v0.6.1
v0.6.2