Lucene search

K
cve[email protected]CVE-2023-42806
HistorySep 21, 2023 - 5:15 p.m.

CVE-2023-42806

2023-09-2117:15:23
CWE-347
web.nvd.nist.gov
15
hydra
cardano
scalability
security
vulnerability
patch
version 0.13.0
value extraction attack
denial of service

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H

0.001 Low

EPSS

Percentile

41.4%

Hydra is the layer-two scalability solution for Cardano. Prior to version 0.13.0, not signing and verifying $\mathsf{cid}$ allows an attacker (which must be a participant of this head) to use a snapshot from an old head instance with the same participants to close the head or contest the state with it. This can lead to an incorrect distribution of value (= value extraction attack; hard, but possible) or prevent the head to finalize because the value available is not consistent with the closed utxo state (= denial of service; easy). A patch is planned for version 0.13.0. As a workaround, rotate keys between heads so not to re-use keys and not result in the same multi-signature participants.

Affected configurations

Vulners
NVD
Node
input-output-hkhydraRange<0.13.0
CPENameOperatorVersion
iohk:hydraiohk hydralt0.13.0

CNA Affected

[
  {
    "vendor": "input-output-hk",
    "product": "hydra",
    "versions": [
      {
        "version": "< 0.13.0",
        "status": "affected"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H

0.001 Low

EPSS

Percentile

41.4%

Related for CVE-2023-42806