CVE-2021-41138
Rust vulnerability analysis and mitigation

Overview

A security vulnerability was discovered in Frontier (CVE-2021-41138) affecting versions >= 88cf884 and < 146bb48. The issue involved transaction validation logic in the pallet-ethereum module where validity checks for signed Frontier-specific extrinsics were not properly called during block execution. The vulnerability was discovered and disclosed in October 2021, and was patched in version 146bb48 (GitHub Advisory).

Technical details

The vulnerability stemmed from a design flaw where a significant portion of transaction validation logic was only being executed during transaction pool validation, but not during actual block execution. This created a security gap where malicious validators could potentially insert invalid transactions into blocks. While signature validation was still performed and most validation occurred in the pallet-evm execution logic, the incomplete validation created potential attack vectors including chain ID replay attacks (GitHub Advisory).

Impact

The impact was considered moderate. While the vulnerability could allow malicious validators to include invalid transactions in blocks and enable chain ID replay attacks, the scope was limited by several factors: 1) signatures were still validated, 2) most validation was performed in pallet-evm execution, and 3) potential spam attacks were constrained by Substrate block size limits (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in commit 146bb48849e5393004be5c88beefe76fdf009aba. The fix involved ensuring that transaction validity controls are properly executed in the State Transition Function (STF) during block execution, not just during pool validation. Users were advised to upgrade to versions containing this patch (GitHub Advisory, GitHub Commit).

Community reactions

The vulnerability was responsibly disclosed and handled, with special acknowledgment given to @librelois, @nanocryk and the Moonbeam team for reporting and fixing the security vulnerability (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66627HIGH8.4
  • RustRust
  • wasmi
NoYesDec 09, 2025
GHSA-xrv8-2pf5-f3q7MEDIUM6
  • RustRust
  • nitro-tpm-pcr-compute
NoYesDec 05, 2025
CVE-2025-67487MEDIUM5.5
  • RustRust
  • static-web-server
NoYesDec 09, 2025
CVE-2025-66622LOW1.3
  • RustRust
  • matrix-sdk-base
NoYesDec 09, 2025
RUSTSEC-2025-0135N/AN/A
  • RustRust
  • matrix-sdk-base
NoYesDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management