Cosmos Network Ethermint <= v0.4.0 is affected by a cross-chain transaction replay vulnerability in the EVM module. Since ethermint uses the same chainIDEpoch and signature schemes with ethereum for compatibility, a verified signature in ethereum is still valid in ethermint with the same msg content and chainIDEpoch, which enables "cross-chain transaction replay" attack.
References
Link | Resource |
---|---|
https://github.com/cosmos/ethermint/issues/687 | Third Party Advisory |
https://github.com/cosmos/ethermint/pull/692 | Patch Third Party Advisory |
https://github.com/cosmos/ethermint/issues/687 | Third Party Advisory |
https://github.com/cosmos/ethermint/pull/692 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/cosmos/ethermint/issues/687 - Third Party Advisory | |
References | () https://github.com/cosmos/ethermint/pull/692 - Patch, Third Party Advisory |
Information
Published : 2021-02-08 18:15
Updated : 2024-11-21 05:55
NVD link : CVE-2021-25835
Mitre link : CVE-2021-25835
CVE.ORG link : CVE-2021-25835
JSON object : View
Products Affected
chainsafe
- ethermint
CWE
CWE-294
Authentication Bypass by Capture-replay