
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability has been detected in HyperLedger Fabric versions v1.4.0, v2.0.0, v2.0.1, and v2.3.0. The vulnerability allows an attacker to cause a denial of service by breaking down multiple orderers through a maliciously constructed message with an invalid header sent to the Order interface. This vulnerability has been assigned CVE-2021-43669 and was fixed by the Fabric developers (NVD).
The vulnerability exists in the interface 'chain.rpc.SendSubmit(dest uint64, request *orderer.SubmitRequest, report func(err error))'. When a malicious node sends a constructed message with an invalid header through this interface, it triggers a panic in the ifConfig function, causing orderers to break down. The vulnerability has been assigned a CVSS v3.1 Base Score of 7.5 (HIGH) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability allows an attacker to cause a denial of service by breaking down as many orderers as desired. When exploited, all targeted orderers will break down immediately upon receiving the maliciously crafted message (GitHub PR).
The vulnerability has been fixed by the Fabric developers through a patch that removes the panic in the ifConfig function. Users should upgrade to the patched versions of the software (GitHub PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."