// For flags

CVE-2024-22192

Ursa CL-Signatures Revocation allows verifiers to generate unique identifiers for holders

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Ursa is a cryptographic library for use with blockchains. The revocation scheme that is part of the Ursa CL-Signatures implementations has a flaw that could impact the privacy guarantees defined by the AnonCreds verifiable credential model. Notably, a malicious verifier may be able to generate a unique identifier for a holder providing a verifiable presentation that includes a Non-Revocation proof. The impact of the flaw is that a malicious verifier may be able to determine a unique identifier for a holder presenting a Non-Revocation proof. Ursa has moved to end-of-life status and no fix is expected.

Ursa es una librería criptográfica para usar con blockchains. El esquema de revocación que forma parte de las implementaciones de Ursa CL-Signatures tiene un fallo que podría afectar las garantías de privacidad definidas por el modelo de credenciales verificables de AnonCreds. En particular, un verificador malicioso puede generar un identificador único para un titular que proporcione una presentación verificable que incluya una prueba de no revocación. El impacto del fallo es que un verificador malicioso puede determinar un identificador único para un titular que presenta una prueba de no revocación. Ursa ha pasado al estado de fin de vida útil y no se espera ninguna solución.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2024-01-08 CVE Reserved
  • 2024-01-16 CVE Published
  • 2024-01-25 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Hyperledger
Search vendor "Hyperledger"
Ursa
Search vendor "Hyperledger" for product "Ursa"
0.1.0
Search vendor "Hyperledger" for product "Ursa" and version "0.1.0"
rust
Affected