Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-23507
HistoryDec 15, 2022 - 12:01 a.m.

CVE-2022-23507 Light client verification not taking into account chain ID

2022-12-1500:01:04
CWE-347
GitHub_M
www.cve.org
tendermint
blockchain
vulnerability
cryptographic signature
verification
chain id
attack vector
ibc-rs
hermes
patched

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

31.5%

Tendermint is a high-performance blockchain consensus engine for Byzantine fault tolerant applications. Versions prior to 0.28.0 contain a potential attack via Improper Verification of Cryptographic Signature, affecting anyone using the tendermint-light-client and related packages to perform light client verification (e.g. IBC-rs, Hermes). The light client does not check that the chain IDs of the trusted and untrusted headers match, resulting in a possible attack vector where someone who finds a header from an untrusted chain that satisfies all other verification conditions (e.g. enough overlapping validator signatures) could fool a light client. The attack vector is currently theoretical, and no proof-of-concept exists yet to exploit it on live networks. This issue is patched in version 0.28.0. There are no workarounds.

CNA Affected

[
  {
    "vendor": "informalsystems",
    "product": "tendermint-rs",
    "versions": [
      {
        "version": "0.28.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

31.5%

Related for CVELIST:CVE-2022-23507