Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66016: CWE-345: Insufficient Verification of Data Authenticity in LFDT-Lockness cggmp21

0
Critical
VulnerabilityCVE-2025-66016cvecve-2025-66016cwe-345
Published: Tue Nov 25 2025 (11/25/2025, 19:48:16 UTC)
Source: CVE Database V5
Vendor/Project: LFDT-Lockness
Product: cggmp21

Description

CVE-2025-66016 is a critical vulnerability in the LFDT-Lockness cggmp21 product, specifically versions prior to 0. 6. 3. The flaw stems from insufficient verification of data authenticity in the zero-knowledge (ZK) proof within the CGGMP24 ECDSA threshold signature scheme (TSS) protocol. This missing check allows a single malicious signer to reconstruct the entire private key, compromising the cryptographic security of the system. The vulnerability has a CVSS 4. 0 score of 9. 3, indicating high exploitability and severe impact without requiring authentication or user interaction. Although no known exploits are currently reported in the wild, the risk is significant due to the nature of the cryptographic key compromise. Mitigation requires upgrading to version 0.

AI-Powered Analysis

AILast updated: 12/02/2025, 20:49:08 UTC

Technical Analysis

CVE-2025-66016 identifies a critical cryptographic vulnerability in the LFDT-Lockness cggmp21 product, which implements the CGGMP24 ECDSA threshold signature scheme (TSS). This protocol supports efficient signing with one round of signing after three preprocessing rounds, identifiable aborts, and key refresh capabilities. The vulnerability arises from an insufficient verification step in the zero-knowledge proof mechanism prior to version 0.6.3. Specifically, the protocol fails to adequately verify the authenticity of data in the ZK proof, classified under CWE-345 (Insufficient Verification of Data Authenticity). This flaw enables a single malicious participant (signer) within the threshold signature scheme to reconstruct the entire private key, thereby breaking the fundamental security guarantees of the cryptographic system. The attack does not require any authentication or user interaction and can be executed remotely, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N). The impact on confidentiality and integrity is high, as the private key compromise can lead to unauthorized signature generation, impersonation, and data breaches. The vulnerability was patched in version 0.6.3, with further security enhancements in version 0.7.0-alpha.2. No known exploits have been reported in the wild, but the critical nature of the flaw demands immediate attention. The vulnerability affects all deployments using cggmp21 versions earlier than 0.6.3, particularly those relying on threshold ECDSA for secure multi-party signing operations.

Potential Impact

The potential impact on European organizations is severe due to the critical nature of the vulnerability. Organizations using cggmp21 in cryptographic operations risk full private key compromise, which can lead to unauthorized transaction signing, data integrity violations, and loss of trust in digital signatures. This is especially impactful for sectors such as banking, finance, telecommunications, government, and critical infrastructure, where threshold signatures are used to secure sensitive operations and multi-party authorization. The compromise of private keys could facilitate fraud, unauthorized access, and disruption of services. Additionally, the breach of cryptographic keys may have regulatory implications under GDPR and other European cybersecurity laws, potentially resulting in fines and reputational damage. The lack of known exploits in the wild does not diminish the urgency, as the vulnerability is straightforward to exploit by a malicious insider or attacker with access to the signing process. The scope of affected systems includes any cryptographic infrastructure leveraging vulnerable versions of cggmp21, which may be embedded in hardware security modules (HSMs), blockchain platforms, or secure communication systems.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade all instances of the LFDT-Lockness cggmp21 product to version 0.6.3 or later, with a strong recommendation to adopt version 0.7.0-alpha.2, which includes additional security checks. Organizations should audit their cryptographic implementations to identify any use of vulnerable versions and verify that no unauthorized key reconstruction has occurred. Implement strict access controls and monitoring around signing operations to detect anomalous behavior indicative of an insider threat. Where possible, employ hardware-based security modules that enforce cryptographic operations and prevent key extraction. Additionally, organizations should review their multi-party signing protocols to ensure no single participant can compromise the entire key. Regularly update threat intelligence and vulnerability management processes to detect and respond to emerging exploits. Finally, consider engaging with vendors and cryptographic experts to validate the security posture of threshold signature deployments and apply best practices for key management and protocol verification.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-21T01:08:02.612Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69260c0cffc41f183f7e2cec

Added to database: 11/25/2025, 8:05:32 PM

Last enriched: 12/2/2025, 8:49:08 PM

Last updated: 1/10/2026, 10:16:18 PM

Views: 129

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats