CVE-2022-23001
- EPSS 0.38%
- Published 29.07.2022 19:15:08
- Last modified 21.11.2024 06:47:46
When compressing or decompressing elliptic curve points using the Sweet B library, an incorrect choice of sign bit is used. An attacker with user level privileges and no other user's assistance can exploit this vulnerability with only knowledge of th...
CVE-2022-23002
- EPSS 0.38%
- Published 29.07.2022 19:15:08
- Last modified 21.11.2024 06:47:46
When compressing or decompressing a point on the NIST P-256 elliptic curve with an X coordinate of zero, the resulting output is not properly reduced modulo the P-256 field prime and is invalid. The resulting output will cause an error when used in o...
CVE-2022-23003
- EPSS 0.38%
- Published 29.07.2022 19:15:08
- Last modified 21.11.2024 06:47:47
When computing a shared secret or point multiplication on the NIST P-256 curve that results in an X coordinate of zero, the resulting output is not properly reduced modulo the P-256 field prime and is invalid. The resulting output may cause an error ...
CVE-2022-23004
- EPSS 0.38%
- Published 29.07.2022 19:15:08
- Last modified 21.11.2024 06:47:47
When computing a shared secret or point multiplication on the NIST P-256 curve using a public key with an X coordinate of zero, an error is returned from the library, and an invalid unreduced value is written to the output buffer. This may be leverag...