Miggo Logo

CVE-2021-21271: Tendermint Core vulnerable to Uncontrolled Resource Consumption

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.67739%
Published
10/7/2022
Updated
5/31/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/tendermint/tendermintgo>= 0.34.0, < 0.34.30.34.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from creating evidence during consensus processing before block finalization. The consensus reactor's tryAddVote generated evidence using non-finalized timestamps, while AddEvidenceFromConsensus bypassed proper timestamp validation. The fix moved evidence creation to EvidencePool using finalized block times, removing these vulnerable code paths.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### **s*ription T*n**rmint *or* v*.**.* intro*u*** * n*w w*y o* **n*lin* *vi**n** o* mis****vior. *s p*rt o* t*is, [w* ***** * n*w `Tim*st*mp` *i*l* to `*vi**n**` stru*ts](*ttps://*it*u*.*om/t*n**rmint/t*n**rmint/pull/****). T*is tim*st*mp woul* **

Reasoning

T** vuln*r**ility st*mm** *rom *r**tin* *vi**n** *urin* *ons*nsus pro**ssin* ***or* *lo*k *in*liz*tion. T** *ons*nsus r***tor's `try***Vot*` **n*r*t** *vi**n** usin* non-*in*liz** tim*st*mps, w*il* `****vi**n***rom*ons*nsus` *yp*ss** prop*r `tim*st*m
CVE-2021-21271: Tendermint Double Sign DoS Bug | Miggo