// For flags

CVE-2024-37158

Evmos is missing precompile checks

Severity Score

3.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Evmos is the Ethereum Virtual Machine (EVM) Hub on the Cosmos Network. Preliminary checks on actions computed by the clawback vesting accounts are performed in the ante handler. Evmos core, implements two different ante handlers: one for Cosmos transactions and one for Ethereum transactions. Checks performed on the two implementation are different. The vulnerability discovered allowed a clawback account to bypass Cosmos ante handler checks by sending an Ethereum transaction targeting a precompile used to interact with a Cosmos SDK module. This vulnerability is fixed in 18.0.0.

Evmos es el centro de máquinas virtuales Ethereum (EVM) en Cosmos Network. Las comprobaciones preliminares de las acciones calculadas por las cuentas de recuperación de derechos se realizan en el gestor ante. El núcleo de Evmos implementa dos controladores de ante diferentes: uno para transacciones Cosmos y otro para transacciones Ethereum. Las comprobaciones realizadas en las dos implementaciones son diferentes. La vulnerabilidad descubierta permitió que una cuenta de recuperación eludiera las comprobaciones del ante handler de Cosmos enviando una transacción de Ethereum dirigida a una precompilación utilizada para interactuar con un módulo SDK de Cosmos. Esta vulnerabilidad se solucionó en 18.0.0.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-06-03 CVE Reserved
  • 2024-06-17 CVE Published
  • 2024-06-18 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-691: Insufficient Control Flow Management
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Evmos
Search vendor "Evmos"
Evmos
Search vendor "Evmos" for product "Evmos"
< 18.0.0
Search vendor "Evmos" for product "Evmos" and version " < 18.0.0"
en
Affected