In Development IL ecdh before 0.2.0, an attacker can send an invalid point (not on the curve) as the public key, and obtain the derived shared secret.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/developmentil/ecdh/issues/3 | Exploit Issue Tracking | 
Configurations
                    Information
                Published : 2023-02-24 12:15
Updated : 2023-03-06 18:33
NVD link : CVE-2022-44310
Mitre link : CVE-2022-44310
JSON object : View
CWE
                
                    
                        
                        CWE-668
                        
            Exposure of Resource to Wrong Sphere
Products Affected
                ecdh_project
- ecdh
 


