CVE-2022-44310
7.5HIGHIn Development IL ecdh before 0.2.0, an attacker can send an invalid point (not on the curve) as the public key, and obtain the derived shared secret.
Published: 2/24/2023Updated: 3/12/2025
Description
In Development IL ecdh before 0.2.0, an attacker can send an invalid point (not on the curve) as the public key, and obtain the derived shared secret.
AI AnalysisPowered by AI
Affected Products
ecdh_projectecdh
References
- https://github.com/developmentil/ecdh/issues/3ExploitIssue Tracking
- https://github.com/developmentil/ecdh/issues/3ExploitIssue Tracking