Headline
CVE-2023-49292: Possible private key restoration
ecies is an Elliptic Curve Integrated Encryption Scheme for secp256k1 in Golang. If funcations Encapsulate(), Decapsulate() and ECDH() could be called by an attacker, they could recover any private key that interacts with it. This vulnerability was patched in 2.0.8. Users are advised to upgrade.
Package
gomod github.com/ecies/go (Go)
Affected versions
<2.0.7
Patched versions
2.0.8
Description
Impact
If funcations Encapsulate(), Decapsulate() and ECDH() could be called by an attacker, he could recover any private key any private key that does interact with it.
Patches
Patched in v2.0.8
Workarounds
You could manually check public key by calling IsOnCurve() function from secp256k1 libraires.
References
https://github.com/ashutosh1206/Crypton/blob/master/Diffie-Hellman-Key-Exchange/Attack-Invalid-Curve-Point/README.md
Severity
High
8.1
/ 10
CVSS base metrics
Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE ID
CVE-2023-49292
Weaknesses
No CWEs
Credits
- L11R Remediation developer
Related news
### Impact If functions `Encapsulate()`, `Decapsulate()` and `ECDH()` could be called by an attacker, he could recover any private key that he interacts with. ### Patches Patched in v2.0.8 ### Workarounds You could manually check public key by calling `IsOnCurve()` function from secp256k1 libraries. ### References https://github.com/ashutosh1206/Crypton/blob/master/Diffie-Hellman-Key-Exchange/Attack-Invalid-Curve-Point/README.md