CVE-2023-35163

Vega is a decentralized trading platform that allows pseudo-anonymous trading of derivatives on a blockchain. Prior to version 0.71.6, a vulnerability exists that allows a malicious validator to trick the Vega network into re-processing past Ethereum events from Vega’s Ethereum bridge. For example, a deposit to the collateral bridge for 100USDT that credits a party’s general account on Vega, can be re-processed 50 times resulting in 5000USDT in that party’s general account. This is without depositing any more than the original 100USDT on the bridge. Despite this exploit requiring access to a validator's Vega key, a validator key can be obtained at the small cost of 3000VEGA, the amount needed to announce a new node onto the network. A patch is available in version 0.71.6. No known workarounds are available, however there are mitigations in place should this vulnerability be exploited. There are monitoring alerts for `mainnet1` in place to identify any issues of this nature including this vulnerability being exploited. The validators have the ability to stop the bridge thus stopping any withdrawals should this vulnerability be exploited.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gobalsky:vega:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:08

Type Values Removed Values Added
References () https://github.com/vegaprotocol/vega/commit/56b09bf57af8cd9eca5996252d86f469a3e34c68 - Patch () https://github.com/vegaprotocol/vega/commit/56b09bf57af8cd9eca5996252d86f469a3e34c68 - Patch
References () https://github.com/vegaprotocol/vega/releases/tag/v0.71.6 - Release Notes () https://github.com/vegaprotocol/vega/releases/tag/v0.71.6 - Release Notes
References () https://github.com/vegaprotocol/vega/security/advisories/GHSA-8rc9-vxjh-qjf2 - Exploit, Mitigation, Vendor Advisory () https://github.com/vegaprotocol/vega/security/advisories/GHSA-8rc9-vxjh-qjf2 - Exploit, Mitigation, Vendor Advisory
CVSS v2 : unknown
v3 : 5.2
v2 : unknown
v3 : 6.0

17 Aug 2023, 14:29

Type Values Removed Values Added
CPE cpe:2.3:a:vega:vega:*:*:*:*:*:*:*:* cpe:2.3:a:gobalsky:vega:*:*:*:*:*:*:*:*
First Time Gobalsky vega
Gobalsky

07 Jul 2023, 15:49

Type Values Removed Values Added
First Time Vega
Vega vega
References (MISC) https://github.com/vegaprotocol/vega/commit/56b09bf57af8cd9eca5996252d86f469a3e34c68 - (MISC) https://github.com/vegaprotocol/vega/commit/56b09bf57af8cd9eca5996252d86f469a3e34c68 - Patch
References (MISC) https://github.com/vegaprotocol/vega/releases/tag/v0.71.6 - (MISC) https://github.com/vegaprotocol/vega/releases/tag/v0.71.6 - Release Notes
References (MISC) https://github.com/vegaprotocol/vega/security/advisories/GHSA-8rc9-vxjh-qjf2 - (MISC) https://github.com/vegaprotocol/vega/security/advisories/GHSA-8rc9-vxjh-qjf2 - Exploit, Mitigation, Vendor Advisory
CPE cpe:2.3:a:vega:vega:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.2

23 Jun 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-23 21:15

Updated : 2024-11-21 08:08


NVD link : CVE-2023-35163

Mitre link : CVE-2023-35163

CVE.ORG link : CVE-2023-35163


JSON object : View

Products Affected

gobalsky

  • vega
CWE
CWE-20

Improper Input Validation