Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-24759
HistoryMar 17, 2022 - 4:40 p.m.

CVE-2022-24759 Failure to validate signature during handshake in @chainsafe/libp2p-noise

2022-03-1716:40:11
CWE-347
GitHub_M
www.cve.org
4
cve-2022-24759
chainsafe
libp2p
encryption
protocol
typescript
validation
signatures
handshake
man-in-the-middle
patch

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

AI Score

8.2

Confidence

High

EPSS

0.001

Percentile

41.3%

@chainsafe/libp2p-noise contains TypeScript implementation of noise protocol, an encryption protocol used in libp2p. @chainsafe/libp2p-noise before 4.1.2 and 5.0.3 does not correctly validate signatures during the handshake process. This may allow a man-in-the-middle to pose as other peers and get those peers banned. Users should upgrade to version 4.1.2 or 5.0.3 to receive a patch. There are currently no known workarounds.

CNA Affected

[
  {
    "product": "js-libp2p-noise",
    "vendor": "ChainSafe",
    "versions": [
      {
        "status": "affected",
        "version": "< 4.1.2"
      },
      {
        "status": "affected",
        "version": ">= 5.0.0, < 5.0.3"
      }
    ]
  }
]

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

AI Score

8.2

Confidence

High

EPSS

0.001

Percentile

41.3%

Related for CVELIST:CVE-2022-24759