// For flags

CVE-2021-41138

Validity check for signed Frontier-specific extrinsic not called in block execution

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Frontier is Substrate's Ethereum compatibility layer. In the newly introduced signed Frontier-specific extrinsic for `pallet-ethereum`, a large part of transaction validation logic was only called in transaction pool validation, but not in block execution. Malicious validators can take advantage of this to put invalid transactions into a block. The attack is limited in that the signature is always validated, and the majority of the validation is done again in the subsequent `pallet-evm` execution logic. However, do note that a chain ID replay attack was possible. In addition, spamming attacks are of main concerns, while they are limited by Substrate block size limits and other factors. The issue is patched in commit `146bb48849e5393004be5c88beefe76fdf009aba`.

Frontier es la capa de compatibilidad con Ethereum de Substrate. En la recién introducida extrínseca específica de Frontier para "pallet-ethereum", una gran parte de la lógica de comprobación de transacciones sólo se llamaba en la comprobación del conjunto de transacciones, pero no en la ejecución del bloque. Los comprobadores maliciosos pueden aprovechar esto para poner transacciones no válidas en un bloque. El ataque está limitado en el sentido de que la firma siempre es validada, y la mayor parte de la comprobación es realizada de nuevo en la lógica de ejecución posterior de "pallet-evm". Sin embargo, es debido tener en cuenta que es posible un ataque de repetición de ID de cadena. Además, los ataques de spam son de las principales preocupaciones, mientras que están limitados por los límites de tamaño de bloque del sustrato y otros factores. El problema está parcheado en el commit "146bb48849e5393004be5c88beefe76fdf009aba"

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-09-15 CVE Reserved
  • 2021-10-13 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-09-18 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Parity
Search vendor "Parity"
Frontier
Search vendor "Parity" for product "Frontier"
>= 2021-09-30 < 2021-10-13
Search vendor "Parity" for product "Frontier" and version " >= 2021-09-30 < 2021-10-13"
-
Affected