Miggo Logo

CVE-2022-24738: Account compromise in Evmos

7.4

CVSS Score
3.1

Basic Information

EPSS Score
0.49016%
Published
3/7/2022
Updated
1/16/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/tharsis/evmosgo< 2.0.12.0.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The critical vulnerability was enabled by the lack of channel authorization checks in the IBC packet reception handler. The attack vector involved sending malicious IBC transfers from unauthorized chains. The patch added 1) a check for authorized channels via params.IsAuthorizedChannel(packet.DestinationChannel), and 2) EVM chain validation via params.IsEVMChannel. The original version of OnRecvPacket in ibc_callbacks.go lacked these protections, making it the primary vulnerable entry point. The commit diff shows these security checks were added to this specific function to mitigate the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## Imp**t _W**t kin* o* vuln*r**ility is it? W*o is imp**t**?_ ### *l*ssi*i**tion T** vuln*r**ility **s ***n *l*ssi*i** *s `*riti**l` wit* * s*or* o* `*.*` (*i***st). It **s t** pot*nti*l to *****t *n* *r*in un*l*im** *ir*rop *un*s *rom *osmos *n*

Reasoning

T** *riti**l vuln*r**ility w*s *n**l** *y t** l**k o* ***nn*l *ut*oriz*tion ****ks in t** I** p**k*t r***ption **n*l*r. T** *tt**k v**tor involv** s*n*in* m*li*ious I** tr*ns**rs *rom un*ut*oriz** ***ins. T** p*t** ***** *) * ****k *or *ut*oriz** ***