What kind of vulnerability is it? Who is impacted?
The vulnerability has been classified as critical
with a score of 9.0
(highest). It has the potential to affect and drain unclaimed airdrop funds from Cosmos and Osmosis eligible user addresses.
The attack requires advanced knowledge of the internals of the core and application packages of IBC, IBC relayers, the Cosmos SDK AnteHandler
, and the Evmos x/claims
module. The step-by-step attack is described below:
AnteHandler
that skips signature verification for transactions, specifically IBC MsgTransfer
. This allows the attacker to impersonate any account by setting a custom sender
address field of the IBC transfer message.recipient
address from the transfer message with an address they control.No users have suffered the loss of funds as no malicious chains have been connected to Evmos.
Has the problem been patched? What versions should users upgrade to?
The patch involves defining a list of authorized channels for chains that are connected to Evmos via IBC. This restricts the chains that have the capability of migrating users' claims records as per the specification. By default, the authorized destination channels are "channel-0"
(Osmosis) and "channel-3"
(Cosmos Hub).
Please upgrade your mainnet node and validator to v2.0.1
ASAP.
Is there a way for users to fix or remediate the vulnerability without upgrading?
No, the fix for the critical vulnerability is state machine breaking. An upgrade procedure must be coordinated with the nodes running the network.
Are there any links users can visit to find out more?
If you have any questions or comments about this advisory:
Thanks to the Core IBC team at Interchain GmbH for the secure disclosure of this vulnerability
{ "nvd_published_at": "2022-03-07T22:15:00Z", "github_reviewed_at": "2022-03-07T21:45:59Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-287" ] }