{"id":"CVE-2022-47930","details":"An issue was discovered in IO FinNet tss-lib before 2.0.0. The parameter ssid for defining a session id is not used through the MPC implementation, which makes replaying and spoofing of messages easier. In particular, the Schnorr proof of knowledge implemented in sch.go does not utilize a session id, context, or random nonce in the generation of the challenge. This could allow a malicious user or an eavesdropper to replay a valid proof sent in the past.","aliases":["GHSA-c58h-qv6g-fw74","GO-2023-1867"],"modified":"2026-03-14T11:55:55.508907Z","published":"2023-04-21T18:15:07.377Z","related":["SUSE-SU-2025:0429-1","openSUSE-SU-2025:14754-1"],"references":[{"type":"WEB","url":"https://medium.com/%40iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b"},{"type":"ADVISORY","url":"https://github.com/IoFinnet/tss-lib/releases/tag/v2.0.0"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-47930.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}]}