CVE-2023-42806

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-42806
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-42806.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-42806
Aliases
  • GHSA-gr36-mc6v-72qq
Published
2023-09-21T16:45:34Z
Modified
2025-10-30T20:23:52.326916Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
Summary
Snapshot signature not including HeadID will allow replay attacks
Details

Hydra is the layer-two scalability solution for Cardano. Prior to version 0.13.0, not signing and verifying $\mathsf{cid}$ allows an attacker (which must be a participant of this head) to use a snapshot from an old head instance with the same participants to close the head or contest the state with it. This can lead to an incorrect distribution of value (= value extraction attack; hard, but possible) or prevent the head to finalize because the value available is not consistent with the closed utxo state (= denial of service; easy). A patch is planned for version 0.13.0. As a workaround, rotate keys between heads so not to re-use keys and not result in the same multi-signature participants.

Database specific
{
    "cwe_ids": [
        "CWE-347"
    ]
}
References

Affected packages

Git / github.com/input-output-hk/hydra

Affected ranges

Type
GIT
Repo
https://github.com/input-output-hk/hydra
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.1.0
0.10.0
0.11.0
0.12.0
0.2.0
0.3.0
0.4.0
0.5.0
0.6.0
0.7.0
0.8.0
0.8.1
0.9.0

plutus-cbor-1.*

plutus-cbor-1.0.0

plutus-merkle-tree-1.*

plutus-merkle-tree-1.0.0