Halborn: Over 280 blockchain networks, including Dogecoin and Litecoin, have 0-day vulnerabilities, putting more than $25 billion in digital assets at risk
ChainCatcher news, blockchain security company Halborn stated that in March 2022, Halborn was hired to assess the Dogecoin open-source codebase for any vulnerabilities that could affect blockchain security. During this assessment, Halborn discovered several serious and exploitable vulnerabilities, which have since been fixed by the Dogecoin team. However, after a broader review, Halborn determined that the same vulnerabilities affected over 280 other networks, including Litecoin and Zcash, putting more than $25 billion in digital assets at risk. Halborn has codenamed this vulnerability "Rab13s."The Rab13s vulnerability was found in the P2P messaging mechanism of the affected networks. By exploiting this vulnerability, an attacker could send carefully crafted malicious consensus messages to various nodes, causing each node to shut down and ultimately putting the network at risk of a 51% attack and other serious issues. A second vulnerability in the RPC service allows attackers to crash nodes via RPC requests. However, successful exploitation requires valid credentials, which reduces the likelihood of risk to the entire network, as some nodes execute the stop command. The third vulnerability allows attackers to execute code in the context of a user running a node via RPC. However, the likelihood of this exploitation is lower, as it requires valid credentials to carry out the attack.Halborn stated that it has developed an exploit toolkit for Rab13s, which includes proof-of-concept with configurable parameters to demonstrate attacks on different networks. All necessary technical information has been shared with identified stakeholders to assist them in fixing the issues, and necessary patches have been released for the community and miners. For projects using UTXO-based nodes (such as Dogecoin), it is recommended to upgrade all nodes to the latest version (1.14.6). Due to the severity of the issue, Halborn will not be releasing further technical or exploit details at this time. (Source link)