Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-34458
HistoryJul 13, 2023 - 6:45 p.m.

CVE-2023-34458 mx-chain-go's relayed transactions always increment nonce

2023-07-1318:45:03
CWE-400
GitHub_M
www.cve.org
multiversx
blockchain protocol
golang
relayed transaction
nonce
dos attack
processing issue
validation
patch
1.4.17

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H

0.001 Low

EPSS

Percentile

26.4%

mx-chain-go is the official implementation of the MultiversX blockchain protocol, written in golang. When executing a relayed transaction, if the inner transaction failed, it would have increased the inner transaction’s sender account nonce. This could have contributed to a limited DoS attack on a targeted account. The fix is a breaking change so a new flag RelayedNonceFixEnableEpoch was needed. This was a strict processing issue while validating blocks on a chain. This vulnerability has been patched in version 1.4.17.

CNA Affected

[
  {
    "vendor": "multiversx",
    "product": "mx-chain-go",
    "versions": [
      {
        "version": "< 1.4.17",
        "status": "affected"
      }
    ]
  }
]

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H

0.001 Low

EPSS

Percentile

26.4%

Related for CVELIST:CVE-2023-34458