CVE-2022-39242
CVSS V2 None
CVSS V3 Medium 5.3
Description
Frontier is an Ethereum compatibility layer for Substrate. Prior to commit d3beddc6911a559a3ecc9b3f08e153dbe37a8658, the worst case weight was always accounted as the block weight for all cases. In case of large EVM gas refunds, this can lead to block spamming attacks -- the adversary can construct blocks with transactions that have large amount of refunds or unused gases with reverts, and as a result inflate up the chain gas prices. The impact of this issue is limited in that the spamming attack would still be costly for any adversary, and it has no ability to alter any chain state. This issue has been patched in commit d3beddc6911a559a3ecc9b3f08e153dbe37a8658. There are no known workarounds.
Overview
- CVE ID
- CVE-2022-39242
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-09-24T02:15:09
- Last Modified Date
- 2022-09-29T14:54:24
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:parity:frontier:*:*:*:*:*:*:*:* | 1 | OR | 2022-09-12 |
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- NONE
- Availability Impact
- LOW
- Base Score
- 5.3
- Base Severity
- MEDIUM
- Exploitability Score
- 3.9
- Impact Score
- 1.4
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-39242 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39242 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-09-24 15:00:10 | Added to TrackCVE | |||
2022-12-07 04:49:18 | 2022-09-24T02:15Z | 2022-09-24T02:15:09 | CVE Published Date | updated |
2022-12-07 04:49:18 | 2022-09-29T14:54:24 | CVE Modified Date | updated | |
2022-12-07 04:49:18 | Analyzed | Vulnerability Status | updated |