6.5
CVE-2022-23507
- EPSS 0.07%
- Veröffentlicht 15.12.2022 19:15:16
- Zuletzt bearbeitet 21.11.2024 06:48:42
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
Tendermint is a high-performance blockchain consensus engine for Byzantine fault tolerant applications. Versions prior to 0.28.0 contain a potential attack via Improper Verification of Cryptographic Signature, affecting anyone using the tendermint-light-client and related packages to perform light client verification (e.g. IBC-rs, Hermes). The light client does not check that the chain IDs of the trusted and untrusted headers match, resulting in a possible attack vector where someone who finds a header from an untrusted chain that satisfies all other verification conditions (e.g. enough overlapping validator signatures) could fool a light client. The attack vector is currently theoretical, and no proof-of-concept exists yet to exploit it on live networks. This issue is patched in version 0.28.0. There are no workarounds.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Tendermint-light-client-js Project ≫ Tendermint-light-client-js SwEditionrust Version < 0.28.0
Tendermint-light-client-verifier Project ≫ Tendermint-light-client-verifier SwPlatformrust Version < 0.28.0
Tendermint-light-client Project ≫ Tendermint-light-client SwEditionrust Version < 0.28.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.223 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.5 | 3.9 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
|
| security-advisories@github.com | 5.4 | 2.2 | 2.7 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
|
CWE-347 Improper Verification of Cryptographic Signature
The product does not verify, or incorrectly verifies, the cryptographic signature for data.