CVE-2022-37450: Go Ethereum allows attackers to use manipulation of time-difference values to achieve replacement of main-chain blocks
5.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.52851%
CWE
-
Published
8/6/2022
Updated
1/27/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/ethereum/go-ethereum | go | <= 1.10.21 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from how fork choice handles timestamp-based difficulty adjustments and tiebreaking. The ReorgNeeded function in forkchoice.go (lines 91-94 referenced in advisories) implements logic where manipulated timestamps could create equal-difficulty scenarios, triggering the vulnerable probabilistic tiebreaker. This matches the described RUM attack vector where timestamp manipulation enables main-chain replacement without risk.