5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
7.3 High
AI Score
Confidence
Low
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.0005 Low
EPSS
Percentile
16.1%
Vyper is a Pythonic Smart Contract Language for the EVM. There is an error in the stack management when compiling the IR
for sha3_64
. Concretely, the height
variable is miscalculated. The vulnerability can’t be triggered without writing the IR
by hand (that is, it cannot be triggered from regular vyper code). sha3_64
is used for retrieval in mappings. No flow that would cache the key
was found so the issue shouldn’t be possible to trigger when compiling the compiler-generated IR
. This issue isn’t triggered during normal compilation of vyper code so the impact is low. At the time of publication there is no patch available.
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
7.3 High
AI Score
Confidence
Low
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.0005 Low
EPSS
Percentile
16.1%