Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2023-42806
HistorySep 21, 2023 - 4:45 p.m.

CVE-2023-42806 Snapshot signature not including HeadID will allow replay attacks

2023-09-2116:45:34
CWE-347
GitHub_M
github.com
cve-2023-42806
snapshot signature
hydra
cardano
replay attacks
scalability
version 0.13.0
$\mathsf{cid}$
attacker
snapshot
distribution of value
value extraction attack
denial of service
patch
keys rotation
multi-signature participants

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0.002

Percentile

56.0%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Hydra is the layer-two scalability solution for Cardano. Prior to version 0.13.0, not signing and verifying $\mathsf{cid}$ allows an attacker (which must be a participant of this head) to use a snapshot from an old head instance with the same participants to close the head or contest the state with it. This can lead to an incorrect distribution of value (= value extraction attack; hard, but possible) or prevent the head to finalize because the value available is not consistent with the closed utxo state (= denial of service; easy). A patch is planned for version 0.13.0. As a workaround, rotate keys between heads so not to re-use keys and not result in the same multi-signature participants.

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0.002

Percentile

56.0%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2023-42806