Vulnerability Details : CVE-2022-23066
Potential exploit
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to transfer tokens or not. The vulnerability affects both integrity and may cause serious availability problems.
Products affected by CVE-2022-23066
- cpe:2.3:a:solana:rbpf:0.2.27:*:*:*:*:*:*:*
- cpe:2.3:a:solana:rbpf:0.2.26:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-23066
0.76%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-23066
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:P |
10.0
|
4.9
|
NIST | |
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
3.9
|
5.2
|
NIST | |
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
3.9
|
5.2
|
Mend |
CWE ids for CVE-2022-23066
-
The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.Assigned by: vulnerabilitylab@mend.io (Primary)
References for CVE-2022-23066
-
https://blocksecteam.medium.com/how-a-critical-bug-in-solana-network-was-detected-and-timely-patched-a701870e1324
Please Wait... | CloudflareExploit;Third Party Advisory
-
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23066
CVE-2022-23066 | WhiteSource Vulnerability DatabaseExploit;Third Party Advisory
-
https://github.com/solana-labs/rbpf/commit/e61e045f8c244de978401d186dcfd50838817297
jit: sign-extend the quotient register on sdiv32 (#310) · solana-labs/rbpf@e61e045 · GitHubPatch;Third Party Advisory
Jump to