CVE-2022-39389

CVSS V2 None CVSS V3 Medium 6.5
Description
Lightning Network Daemon (lnd) is an implementation of a lightning bitcoin overlay network node. All lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected. This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC. A patch is available in `lnd` version 0.15.4. Users are advised to upgrade. Users unable to upgrade may use the `lncli updatechanpolicy` RPC call to increase their CLTV value to a very high amount or increase their fee policies. This will prevent nodes from routing through your node, meaning that no pending HTLCs can be present.
Overview
  • CVE ID
  • CVE-2022-39389
  • Assigner
  • security-advisories@github.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-11-17T22:15:10
  • Last Modified Date
  • 2022-11-22T16:49:51
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:btcd_project:btcd:*:*:*:*:*:*:*:* 1 OR 0.23.3
cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:*:*:*:*:*:*:*:* 1 OR 0.15.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • LOW
  • Base Score
  • 6.5
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 3.9
  • Impact Score
  • 2.5
History
Created Old Value New Value Data Type Notes
2022-11-17 23:00:10 Added to TrackCVE
2022-12-07 17:51:26 2022-11-17T22:15Z 2022-11-17T22:15:10 CVE Published Date updated
2022-12-07 17:51:26 2022-11-22T16:49:51 CVE Modified Date updated
2022-12-07 17:51:26 Analyzed Vulnerability Status updated
2022-12-07 17:51:28 CPE Information updated