
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-38701 affects Hydra, a layer-two scalability solution for Cardano. The vulnerability was discovered in versions prior to 0.12.0, where a critical flaw in the commit validator's check mechanism allowed unauthorized access to committed UTxOs. The issue was disclosed on October 4, 2023, and has been assigned a CVSS v3.1 base score of 9.1 (Critical) (GitHub Advisory).
The vulnerability exists in the commit validator's ViaAbort redeemer functionality. The flaw stems from an improper check in the mustBurnST function, which incorrectly returns True if the txmint field contains no entries, instead of properly verifying the head ID state token burning. This implementation error allows bypassing the head validator execution and its associated security checks (GitHub Advisory).
The vulnerability allows attackers to steal any funds that users attempt to commit into a Hydra head. Additionally, attackers can prevent any Hydra head from being successfully opened. However, the vulnerability does not affect funds that have already been successfully collected into and currently reside in the head validator (GitHub Advisory).
The vulnerability has been fixed in version 0.12.0 of Hydra. Users are strongly advised to upgrade to this version or later to protect against potential attacks (GitHub Advisory, Hydra Changelog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."