Vulnerability Details : CVE-2023-35163
Potential exploit
Vega is a decentralized trading platform that allows pseudo-anonymous trading of derivatives on a blockchain. Prior to version 0.71.6, a vulnerability exists that allows a malicious validator to trick the Vega network into re-processing past Ethereum events from Vega’s Ethereum bridge. For example, a deposit to the collateral bridge for 100USDT that credits a party’s general account on Vega, can be re-processed 50 times resulting in 5000USDT in that party’s general account. This is without depositing any more than the original 100USDT on the bridge. Despite this exploit requiring access to a validator's Vega key, a validator key can be obtained at the small cost of 3000VEGA, the amount needed to announce a new node onto the network.
A patch is available in version 0.71.6. No known workarounds are available, however there are mitigations in place should this vulnerability be exploited. There are monitoring alerts for `mainnet1` in place to identify any issues of this nature including this vulnerability being exploited. The validators have the ability to stop the bridge thus stopping any withdrawals should this vulnerability be exploited.
Vulnerability category: Input validation
Products affected by CVE-2023-35163
- cpe:2.3:a:gobalsky:vega:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-35163
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 17 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-35163
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.2
|
MEDIUM | CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L |
0.9
|
4.2
|
NIST | |
6.0
|
MEDIUM | CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:L |
0.2
|
5.3
|
GitHub, Inc. |
CWE ids for CVE-2023-35163
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-35163
-
https://github.com/vegaprotocol/vega/commit/56b09bf57af8cd9eca5996252d86f469a3e34c68
Merge pull request from GHSA-8rc9-vxjh-qjf2 · vegaprotocol/vega@56b09bf · GitHubPatch
-
https://github.com/vegaprotocol/vega/releases/tag/v0.71.6
Release v0.71.6 · vegaprotocol/vega · GitHubRelease Notes
-
https://github.com/vegaprotocol/vega/security/advisories/GHSA-8rc9-vxjh-qjf2
Validators able to submit duplicate transactions · Advisory · vegaprotocol/vega · GitHubExploit;Mitigation;Vendor Advisory
Jump to