Lucene search

K
cve[email protected]CVE-2022-46173
HistoryDec 28, 2022 - 7:15 a.m.

CVE-2022-46173

2022-12-2807:15:08
CWE-669
web.nvd.nist.gov
32
elrond-go
elrond network
cve-2022-46173
security vulnerability
smart contract
node
processing issue
patch

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L

0.001 Low

EPSS

Percentile

42.3%

Elrond-GO is a go implementation for the Elrond Network protocol. Versions prior to 1.3.50 are subject to a processing issue where nodes are affected when trying to process a cross-shard relayed transaction with a smart contract deploy transaction data. The problem was a bad correlation between the transaction caches and the processing component. If the above-mentioned transaction was sent with more gas than required, the smart contract result (SCR transaction) that should have returned the leftover gas, would have been wrongly added to a cache that the processing unit did not consider. The node stopped notarizing metachain blocks. The fix was actually to extend the SCR transaction search in all other caches if it wasn’t found in the correct (expected) sharded-cache. There are no known workarounds at this time. This issue has been patched in version 1.3.50.

Affected configurations

Vulners
NVD
Node
elrondnetworkelrond_goRange<1.3.50

CNA Affected

[
  {
    "vendor": "ElrondNetwork",
    "product": "elrond-go",
    "versions": [
      {
        "version": "< 1.3.50",
        "status": "affected"
      }
    ]
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L

0.001 Low

EPSS

Percentile

42.3%