CVE-2022-31006
Hyperledger Indy DOS vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
indy-node is the server portion of Hyperledger Indy, a distributed ledger purpose-built for decentralized identity. In vulnerable versions of indy-node, an attacker can max out the number of client connections allowed by the ledger, leaving the ledger unable to be used for its intended purpose. However, the ledger content will not be impacted and the ledger will resume functioning after the attack. This attack exploits the trade-off between resilience and availability. Any protection against abusive client connections will also prevent the network being accessed by certain legitimate users. As a result, validator nodes must tune their firewall rules to ensure the right trade-off for their network's expected users. The guidance to network operators for the use of firewall rules in the deployment of Indy networks has been modified to better protect against denial of service attacks by increasing the cost and complexity in mounting such attacks. The mitigation for this vulnerability is not in the Hyperledger Indy code per se, but rather in the individual deployments of Indy. The mitigations should be applied to all deployments of Indy, and are not related to a particular release.
indy-node es la parte del servidor de Hyperledger Indy, un libro de contabilidad distribuido diseñado para la identidad descentralizada. En las versiones vulnerables de indy-node, un atacante puede superar el número de conexiones de clientes permitidas por el libro mayor, dejando el libro mayor incapaz de ser usado para su propósito. Sin embargo, el contenido del libro mayor no estará afectado y el libro mayor volverá a funcionar después del ataque. Este ataque aprovecha el equilibrio entre la resistencia y la disponibilidad. Cualquier protección contra las conexiones abusivas de los clientes también impedirá el acceso a la red de ciertos usuarios legítimos. Por ello, los nodos validadores deben ajustar sus reglas de firewall para garantizar el equilibrio apropiado para los usuarios previstos de su red. Las orientaciones a operadores de redes para el uso de reglas de firewall en el despliegue de las redes Indy han sido modificadas para proteger mejor contra los ataques de denegación de servicio, aumentando el coste y la complejidad en el montaje de dichos ataques. La mitigación de esta vulnerabilidad no está en el código de Hyperledger Indy per se, sino en los despliegues individuales de Indy. Las mitigaciones deben aplicarse a todas las implementaciones de Indy, y no están relacionadas con una versión en particular
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-05-18 CVE Reserved
- 2022-09-09 CVE Published
- 2024-04-01 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://github.com/hyperledger/indy-node/security/advisories/GHSA-x996-7qh9-7ff7 | Mitigation |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/hyperledger/indy-node/commit/53a2a1bf1a26cb8ba710fd6adc8bcf275186a4b3 | 2022-09-15 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linuxfoundation Search vendor "Linuxfoundation" | Indy-node Search vendor "Linuxfoundation" for product "Indy-node" | <= 1.12.6 Search vendor "Linuxfoundation" for product "Indy-node" and version " <= 1.12.6" | - |
Affected
| ||||||
Linuxfoundation Search vendor "Linuxfoundation" | Indy-node Search vendor "Linuxfoundation" for product "Indy-node" | 1.13.2 Search vendor "Linuxfoundation" for product "Indy-node" and version "1.13.2" | rc1 |
Affected
|