CVE-2021-25837
CVSS V2 Medium 5
CVSS V3 High 7.5
Description
Cosmos Network Ethermint <= v0.4.0 is affected by cache lifecycle inconsistency in the EVM module. Due to the inconsistency between the Storage caching cycle and the Tx processing cycle, Storage changes caused by a failed transaction are improperly reserved in memory. Although the bad storage cache data will be discarded at EndBlock, it is still valid in the current block, which enables many possible attacks such as an "arbitrary mint token".
Overview
- CVE ID
- CVE-2021-25837
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2021-02-08T18:15:13
- Last Modified Date
- 2021-02-12T13:54:34
Weakness Enumerations
CPE Configuration (Product)
| CPE | Vulnerable | Operator | Version Start | Version End |
|---|---|---|---|---|
| cpe:2.3:a:chainsafe:ethermint:*:*:*:*:*:*:*:* | 1 | OR | 0.4.0 |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:N/I:P/A:N
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- NONE
- Integrity Impact
- PARTIAL
- Availability Impact
- NONE
- Base Score
- 5
- Severity
- MEDIUM
- Exploitability Score
- 10
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- NONE
- Availability Impact
- NONE
- Base Score
- 7.5
- Base Severity
- HIGH
- Exploitability Score
- 3.9
- Impact Score
- 3.6
References
| Reference URL | Reference Tags |
|---|---|
| https://github.com/cosmos/ethermint/issues/667#issuecomment-759284107 | Exploit Third Party Advisory |
Sources
| Source Name | Source URL |
|---|---|
| NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-25837 |
| MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25837 |
History
| Created | Old Value | New Value | Data Type | Notes |
|---|---|---|---|---|
| 2022-05-10 07:23:30 | Added to TrackCVE | |||
| 2022-12-05 21:33:59 | 2021-02-08T18:15Z | 2021-02-08T18:15:13 | CVE Published Date | updated |
| 2022-12-05 21:33:59 | 2021-02-12T13:54:34 | CVE Modified Date | updated | |
| 2022-12-05 21:33:59 | Analyzed | Vulnerability Status | updated |