Executive Summary

Informations
Name CVE-2024-1631 First vendor Publication 2024-02-21
Vendor Cve Last vendor Modification 2024-02-22

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Impact: The library offers a function to generate an ed25519 key pair via Ed25519KeyIdentity.generate with an optional param to provide a 32 byte seed value, which will then be used as the secret key. When no seed value is provided, it is expected that the library generates the secret key using secure randomness. However, a recent change broke this guarantee and uses an insecure seed for key pair generation. Since the private key of this identity (535yc-uxytb-gfk7h-tny7p-vjkoe-i4krp-3qmcl-uqfgr-cpgej-yqtjq-rqe) is compromised, one could lose funds associated with the principal on ledgers or lose access to a canister where this principal is the controller.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1631

Sources (Detail)

https://agent-js.icp.xyz/identity/index.html
https://github.com/dfinity/agent-js
https://github.com/dfinity/agent-js/pull/851
https://github.com/dfinity/agent-js/security/advisories/GHSA-c9vv-fhgv-cjc3
https://www.npmjs.com/package/@dfinity/identity/v/1.0.1
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2024-02-23 00:27:24
  • Multiple Updates
2024-02-21 09:27:25
  • First insertion