8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.008 Low
EPSS
Percentile
81.5%
The pool-upgrade
request handler in Indy-Node <=1.12.4
allows an improperly authenticated attacker to remotely execute code on nodes within the network.
Network operators are strongly encouraged to upgrade to the latest Indy-Node release >=1.12.5
as soon as possible.
The pool-upgrade
request handler in Indy-Node >=1.12.5
has been updated to properly authenticate pool-upgrade
transactions before any processing is performed by the request handler. The transactions are further sanitized to prevent remote code execution.
Network operators are strongly encouraged to upgrade to the latest Indy-Node release >=1.12.5
as soon as possible.
Thank you to @shakreiner at CyberArk Labs for finding and responsibly disclosing this issue.
github.com/hyperledger/indy-node
github.com/hyperledger/indy-node/commit/fe507474f77084faef4539101e2bbb4d508a97f5
github.com/hyperledger/indy-node/releases/tag/v1.12.5
github.com/hyperledger/indy-node/security/advisories/GHSA-r6v9-p59m-gj2p
github.com/pypa/advisory-database/tree/main/vulns/indy-node/PYSEC-2022-265.yaml
nvd.nist.gov/vuln/detail/CVE-2022-31020