Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66017: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in LFDT-Lockness cggmp21

0
High
VulnerabilityCVE-2025-66017cvecve-2025-66017cwe-327
Published: Tue Nov 25 2025 (11/25/2025, 19:59:07 UTC)
Source: CVE Database V5
Vendor/Project: LFDT-Lockness
Product: cggmp21

Description

CVE-2025-66017 is a high-severity vulnerability affecting LFDT-Lockness's cggmp21 and cggmp24 cryptographic libraries. The flaw involves the use of presignatures in versions cggmp21 <= 0. 6. 3 and cggmp24 0. 7. 0-alpha. 1, which significantly reduces the security of the ECDSA threshold signature scheme (TSS) implementation. This vulnerability stems from the use of a broken or risky cryptographic algorithm (CWE-327), potentially allowing attackers to compromise signature integrity. The issue is addressed in cggmp24 version 0. 7.

AI-Powered Analysis

AILast updated: 12/02/2025, 20:49:22 UTC

Technical Analysis

CVE-2025-66017 identifies a cryptographic vulnerability in the LFDT-Lockness cggmp21 and cggmp24 libraries, which implement an advanced ECDSA threshold signature scheme (TSS). The vulnerability arises from the insecure use of presignatures in versions cggmp21 up to 0.6.3 and cggmp24 version 0.7.0-alpha.1. Presignatures are intermediate cryptographic values generated during the signing process intended to optimize performance. However, in these affected versions, presignatures can be exploited in a manner that significantly weakens the security guarantees of the TSS protocol, potentially allowing attackers to forge signatures or undermine key confidentiality. This is classified under CWE-327, indicating the use of a broken or risky cryptographic algorithm. The vulnerability does not require authentication or user interaction and can be exploited remotely, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on the integrity of signatures, which is critical for systems relying on cryptographic proofs for authentication, authorization, or transaction validation. The vulnerability was addressed in cggmp24 version 0.7.0-alpha.2, which includes API changes that prevent presignatures from being used insecurely, thus restoring the intended security properties of the protocol. No public exploits have been reported yet, but the high CVSS score reflects the potential severity if exploited.

Potential Impact

For European organizations, the impact of CVE-2025-66017 can be substantial, especially for those using LFDT-Lockness's cggmp21 or cggmp24 libraries in critical applications such as secure communications, blockchain technologies, digital signatures, or multi-party computation systems. The vulnerability compromises the integrity of cryptographic signatures, potentially allowing attackers to forge signatures or disrupt trust mechanisms. This could lead to unauthorized transactions, data tampering, or impersonation attacks. Given the increasing reliance on threshold signature schemes for distributed key management and secure signing in financial services, government agencies, and critical infrastructure sectors, exploitation could undermine operational security and regulatory compliance. The lack of required privileges or user interaction lowers the barrier for remote exploitation, increasing risk exposure. Although no known exploits are currently active, the high severity score and the nature of the vulnerability warrant immediate attention to prevent future attacks. Organizations involved in blockchain, digital identity, or secure messaging within Europe should consider this a significant threat to their cryptographic security posture.

Mitigation Recommendations

European organizations should immediately assess their use of LFDT-Lockness cggmp21 and cggmp24 libraries in their software stacks. The primary mitigation is to upgrade to cggmp24 version 0.7.0-alpha.2 or later, which contains API changes that prevent insecure presignature usage. If upgrading is not immediately feasible, organizations should audit their cryptographic workflows to ensure presignatures are not used in insecure contexts, potentially disabling or restricting presignature functionality until patched. Additionally, implement rigorous cryptographic code reviews and testing to detect misuse of presignatures. Organizations should monitor vendor advisories and threat intelligence feeds for any emerging exploits. For critical systems, consider deploying cryptographic hardware modules or alternative vetted cryptographic libraries that do not exhibit this vulnerability. Finally, ensure incident response plans include scenarios involving cryptographic compromise to rapidly detect and respond to potential signature forgery or key misuse.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-21T01:08:02.613Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69260c0cffc41f183f7e2ce2

Added to database: 11/25/2025, 8:05:32 PM

Last enriched: 12/2/2025, 8:49:22 PM

Last updated: 1/10/2026, 10:14:36 PM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats