// For flags

CVE-2022-31006

Hyperledger Indy DOS vulnerability

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

indy-node is the server portion of Hyperledger Indy, a distributed ledger purpose-built for decentralized identity. In vulnerable versions of indy-node, an attacker can max out the number of client connections allowed by the ledger, leaving the ledger unable to be used for its intended purpose. However, the ledger content will not be impacted and the ledger will resume functioning after the attack. This attack exploits the trade-off between resilience and availability. Any protection against abusive client connections will also prevent the network being accessed by certain legitimate users. As a result, validator nodes must tune their firewall rules to ensure the right trade-off for their network's expected users. The guidance to network operators for the use of firewall rules in the deployment of Indy networks has been modified to better protect against denial of service attacks by increasing the cost and complexity in mounting such attacks. The mitigation for this vulnerability is not in the Hyperledger Indy code per se, but rather in the individual deployments of Indy. The mitigations should be applied to all deployments of Indy, and are not related to a particular release.

indy-node es la parte del servidor de Hyperledger Indy, un libro de contabilidad distribuido diseñado para la identidad descentralizada. En las versiones vulnerables de indy-node, un atacante puede superar el número de conexiones de clientes permitidas por el libro mayor, dejando el libro mayor incapaz de ser usado para su propósito. Sin embargo, el contenido del libro mayor no estará afectado y el libro mayor volverá a funcionar después del ataque. Este ataque aprovecha el equilibrio entre la resistencia y la disponibilidad. Cualquier protección contra las conexiones abusivas de los clientes también impedirá el acceso a la red de ciertos usuarios legítimos. Por ello, los nodos validadores deben ajustar sus reglas de firewall para garantizar el equilibrio apropiado para los usuarios previstos de su red. Las orientaciones a operadores de redes para el uso de reglas de firewall en el despliegue de las redes Indy han sido modificadas para proteger mejor contra los ataques de denegación de servicio, aumentando el coste y la complejidad en el montaje de dichos ataques. La mitigación de esta vulnerabilidad no está en el código de Hyperledger Indy per se, sino en los despliegues individuales de Indy. Las mitigaciones deben aplicarse a todas las implementaciones de Indy, y no están relacionadas con una versión en particular

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-05-18 CVE Reserved
  • 2022-09-09 CVE Published
  • 2024-04-01 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-400: Uncontrolled Resource Consumption
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linuxfoundation
Search vendor "Linuxfoundation"
Indy-node
Search vendor "Linuxfoundation" for product "Indy-node"
<= 1.12.6
Search vendor "Linuxfoundation" for product "Indy-node" and version " <= 1.12.6"
-
Affected
Linuxfoundation
Search vendor "Linuxfoundation"
Indy-node
Search vendor "Linuxfoundation" for product "Indy-node"
1.13.2
Search vendor "Linuxfoundation" for product "Indy-node" and version "1.13.2"
rc1
Affected