Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-45040
HistorySep 06, 2024 - 12:53 p.m.

CVE-2024-45040 gnark's commitments to private witnesses in Groth16 as implemented break zero-knowledge property

2024-09-0612:53:30
CWE-200
GitHub_M
github.com
2
zero-knowledge property
groth16
commitments
plonk proofs
vulnerability
enumeration
completeness
soundness
zk-snark
library
version 0.11.0

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.7

Confidence

High

EPSS

0

Percentile

16.3%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

gnark is a fast zk-SNARK library that offers a high-level API to design circuits. Prior to version 0.11.0, commitments to private witnesses in Groth16 as implemented break the zero-knowledge property. The vulnerability affects only Groth16 proofs with commitments. Notably, PLONK proofs are not affected. The vulnerability affects the zero-knowledge property of the proofs - in case the witness (secret or internal) values are small, then the attacker may be able to enumerate all possible choices to deduce the actual value. If the possible choices for the variables to be committed is large or there are many values committed, then it would be computationally infeasible to enumerate all valid choices. It doesn’t affect the completeness/soundness of the proofs. The vulnerability has been fixed in version 0.11.0. The patch to fix the issue is to add additional randomized value to the list of committed value at proving time to mask the rest of the values which were committed. As a workaround, the user can manually commit to a randomized value.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:consensys:gnark:*:*:*:*:*:*:*:*"
    ],
    "vendor": "consensys",
    "product": "gnark",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "0.11.0"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.7

Confidence

High

EPSS

0

Percentile

16.3%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-45040