In Development IL ecdh before 0.2.0, an attacker can send an invalid point (not on the curve) as the public key, and obtain the derived shared secret.
References
Link | Resource |
---|---|
https://github.com/developmentil/ecdh/issues/3 | Exploit Issue Tracking |
Configurations
Information
Published : 2023-02-24 12:15
Updated : 2023-03-06 18:33
NVD link : CVE-2022-44310
Mitre link : CVE-2022-44310
JSON object : View
CWE
CWE-668
Exposure of Resource to Wrong Sphere
Products Affected
ecdh_project
- ecdh