
Cloud Vulnerability DB
A community-led vulnerabilities database
Tendermint, a high-performance blockchain consensus engine for Byzantine fault tolerant applications, disclosed a vulnerability (CVE-2022-23507) affecting versions prior to 0.28.0. The vulnerability impacts users of the tendermint-light-client and related packages, including IBC-rs and Hermes, for performing light client verification (GitHub Advisory, NVD).
The vulnerability stems from an Improper Verification of Cryptographic Signature issue where the light client fails to verify that the chain IDs of the trusted and untrusted headers match. This oversight in the verification process could potentially allow an attacker to exploit the system by using a header from an untrusted chain that meets all other verification conditions, such as having enough overlapping validator signatures (GitHub Advisory). The vulnerability has been assigned a CVSS v3.1 base score of 6.5 MEDIUM by NVD and 5.4 MEDIUM by GitHub (NVD).
The vulnerability could potentially allow an attacker to fool a light client by exploiting the chain ID verification bypass. However, the attack vector is currently theoretical, and no proof-of-concept exists for exploiting it on live networks (GitHub Advisory).
The vulnerability has been patched in version 0.28.0 of the affected packages. Users of the light client-related crates are advised to upgrade to this version. No workarounds are available for this vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."