CVE-2020-12118
Description
The keygen protocol implementation in Binance tss-lib before 1.2.0 allows attackers to generate crafted h1 and h2 parameters in order to compromise a signing round or obtain sensitive information from other parties.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A flaw in the keygen protocol of Binance tss-lib before 1.2.0 allows crafted parameters to compromise signing rounds or leak sensitive information.
The vulnerability exists in the key generation (keygen) protocol implementation of Binance tss-lib, a threshold signature scheme library. Prior to version 1.2.0, the protocol allowed an attacker to generate crafted h1 and h2 parameters during the distributed key generation process [1][2]. This stems from insufficient validation of the discrete logarithm proof (DLNProof) that is supposed to guarantee both parties share the same group modulo N [3].
An attacker who participates in the keygen protocol can supply malicious h1 and h2 values that pass the existing proof checks but do not actually satisfy the required group relationship [1]. No special network position is required beyond being a participant in the keygen; the attacker may be any party in the multi-party computation [2]. The flaw can be triggered without authentication bypass—the attacker simply follows the protocol steps but with crafted parameters.
Successful exploitation allows the attacker to compromise the integrity of subsequent signing rounds, potentially leading to signature forgery or the extraction of sensitive information about other parties' secret shares [2]. This undermines the security guarantees of the threshold signature scheme, which is designed to prevent any single participant from learning others' secrets or producing valid signatures alone.
The issue was addressed in version 1.2.0 of tss-lib, released on GitHub, which includes a corrected DLNProof implementation [1][4]. Users are advised to update to v1.2.0 or later. No workaround is available; updating the library is the only recommended mitigation.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/binance-chain/tss-libGo | < 1.2.0 | 1.2.0 |
Affected products
2- Binance/tss-libdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-399h-cmvp-qgx5ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-12118ghsaADVISORY
- github.com/binance-chain/tss-lib/pull/89ghsax_refsource_MISCWEB
- github.com/binance-chain/tss-lib/pull/89/commits/7b7c17e90504d5dad94b938e84fec690bb1ec311ghsaWEB
- github.com/binance-chain/tss-lib/releases/tag/v1.2.0ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.