Vulnerabilites related to lightning_network_daemon_project - lightning_network_daemon
cve-2020-26896
Vulnerability from cvelistv5
Published
2020-10-21 02:00
Modified
2024-08-04 16:03
Severity ?
Summary
Prior to 0.11.0-beta, LND (Lightning Network Daemon) had a vulnerability in its invoice database. While claiming on-chain a received HTLC output, it didn't verify that the corresponding outgoing off-chain HTLC was already settled before releasing the preimage. In the case of a hash-and-amount collision with an invoice, the preimage for an expected payment was instead released. A malicious peer could have deliberately intercepted an HTLC intended for the victim node, probed the preimage through a colluding relayed HTLC, and stolen the intercepted HTLC. The impact is a loss of funds in certain situations, and a weakening of the victim's receiver privacy.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T16:03:23.164Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://gist.github.com/ariard/6bdeb995565d1cc292753e1ee4ae402d",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Prior to 0.11.0-beta, LND (Lightning Network Daemon) had a vulnerability in its invoice database. While claiming on-chain a received HTLC output, it didn't verify that the corresponding outgoing off-chain HTLC was already settled before releasing the preimage. In the case of a hash-and-amount collision with an invoice, the preimage for an expected payment was instead released. A malicious peer could have deliberately intercepted an HTLC intended for the victim node, probed the preimage through a colluding relayed HTLC, and stolen the intercepted HTLC. The impact is a loss of funds in certain situations, and a weakening of the victim's receiver privacy.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-10-21T02:00:49",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://gist.github.com/ariard/6bdeb995565d1cc292753e1ee4ae402d",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-26896",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Prior to 0.11.0-beta, LND (Lightning Network Daemon) had a vulnerability in its invoice database. While claiming on-chain a received HTLC output, it didn't verify that the corresponding outgoing off-chain HTLC was already settled before releasing the preimage. In the case of a hash-and-amount collision with an invoice, the preimage for an expected payment was instead released. A malicious peer could have deliberately intercepted an HTLC intended for the victim node, probed the preimage through a colluding relayed HTLC, and stolen the intercepted HTLC. The impact is a loss of funds in certain situations, and a weakening of the victim's receiver privacy.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://gist.github.com/ariard/6bdeb995565d1cc292753e1ee4ae402d",
                     refsource: "MISC",
                     url: "https://gist.github.com/ariard/6bdeb995565d1cc292753e1ee4ae402d",
                  },
                  {
                     name: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html",
                     refsource: "MISC",
                     url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html",
                  },
                  {
                     name: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html",
                     refsource: "MISC",
                     url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-26896",
      datePublished: "2020-10-21T02:00:49",
      dateReserved: "2020-10-09T00:00:00",
      dateUpdated: "2024-08-04T16:03:23.164Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-44797
Vulnerability from cvelistv5
Published
2022-11-07 00:00
Modified
2024-08-03 14:01
Severity ?
Summary
btcd before 0.23.2, as used in Lightning Labs lnd before 0.15.2-beta and other Bitcoin-related products, mishandles witness size checking.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T14:01:31.255Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/lightningnetwork/lnd/issues/7002",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.2-beta",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/btcsuite/btcd/pull/1896",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/btcsuite/btcd/releases/tag/v0.23.2",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "btcd before 0.23.2, as used in Lightning Labs lnd before 0.15.2-beta and other Bitcoin-related products, mishandles witness size checking.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-11-07T00:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://github.com/lightningnetwork/lnd/issues/7002",
            },
            {
               url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.2-beta",
            },
            {
               url: "https://github.com/btcsuite/btcd/pull/1896",
            },
            {
               url: "https://github.com/btcsuite/btcd/releases/tag/v0.23.2",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2022-44797",
      datePublished: "2022-11-07T00:00:00",
      dateReserved: "2022-11-07T00:00:00",
      dateUpdated: "2024-08-03T14:01:31.255Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-41593
Vulnerability from cvelistv5
Published
2021-10-04 16:54
Modified
2024-08-04 03:15
Severity ?
Summary
Lightning Labs lnd before 0.13.3-beta allows loss of funds because of dust HTLC exposure.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T03:15:29.101Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.13.3-beta",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.md",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Lightning Labs lnd before 0.13.3-beta allows loss of funds because of dust HTLC exposure.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-04T21:04:18",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.13.3-beta",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.md",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2021-41593",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Lightning Labs lnd before 0.13.3-beta allows loss of funds because of dust HTLC exposure.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html",
                     refsource: "MISC",
                     url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html",
                  },
                  {
                     name: "https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing",
                     refsource: "MISC",
                     url: "https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing",
                  },
                  {
                     name: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html",
                     refsource: "MISC",
                     url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html",
                  },
                  {
                     name: "https://github.com/lightningnetwork/lnd/releases/tag/v0.13.3-beta",
                     refsource: "MISC",
                     url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.13.3-beta",
                  },
                  {
                     name: "https://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.md",
                     refsource: "MISC",
                     url: "https://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.md",
                  },
                  {
                     name: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.html",
                     refsource: "MISC",
                     url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2021-41593",
      datePublished: "2021-10-04T16:54:36",
      dateReserved: "2021-09-24T00:00:00",
      dateUpdated: "2024-08-04T03:15:29.101Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-39389
Vulnerability from cvelistv5
Published
2022-11-17 00:00
Modified
2024-08-03 12:07
Summary
Lightning Network Daemon (lnd) is an implementation of a lightning bitcoin overlay network node. All lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected. This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC. A patch is available in `lnd` version 0.15.4. Users are advised to upgrade. Users unable to upgrade may use the `lncli updatechanpolicy` RPC call to increase their CLTV value to a very high amount or increase their fee policies. This will prevent nodes from routing through your node, meaning that no pending HTLCs can be present.
Impacted products
Vendor Product Version
lightningnetwork lnd Version: < v0.15.4-beta
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T12:07:41.957Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/lightningnetwork/lnd/security/advisories/GHSA-hc82-w9v8-83pr",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/lightningnetwork/lnd/issues/7096",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/lightningnetwork/lnd/pull/7098",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.4-beta",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "lnd",
               vendor: "lightningnetwork",
               versions: [
                  {
                     status: "affected",
                     version: " < v0.15.4-beta",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Lightning Network Daemon (lnd) is an implementation of a lightning bitcoin overlay network node. All lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected. This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC. A patch is available in `lnd` version 0.15.4. Users are advised to upgrade. Users unable to upgrade may use the `lncli updatechanpolicy` RPC call to increase their CLTV value to a very high amount or increase their fee policies. This will prevent nodes from routing through your node, meaning that no pending HTLCs can be present.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-20",
                     description: "CWE-20: Improper Input Validation",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-11-17T00:00:00",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               url: "https://github.com/lightningnetwork/lnd/security/advisories/GHSA-hc82-w9v8-83pr",
            },
            {
               url: "https://github.com/lightningnetwork/lnd/issues/7096",
            },
            {
               url: "https://github.com/lightningnetwork/lnd/pull/7098",
            },
            {
               url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.4-beta",
            },
         ],
         source: {
            advisory: "GHSA-hc82-w9v8-83pr",
            discovery: "UNKNOWN",
         },
         title: "Witness Block Parsing DoS Vulnerability in lnd",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2022-39389",
      datePublished: "2022-11-17T00:00:00",
      dateReserved: "2022-09-02T00:00:00",
      dateUpdated: "2024-08-03T12:07:41.957Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-26895
Vulnerability from cvelistv5
Published
2020-10-21 02:00
Modified
2024-08-04 16:03
Severity ?
Summary
Prior to 0.10.0-beta, LND (Lightning Network Daemon) would have accepted a counterparty high-S signature and broadcast tx-relay invalid local commitment/HTLC transactions. This can be exploited by any peer with an open channel regardless of the victim situation (e.g., routing node, payment-receiver, or payment-sender). The impact is a loss of funds in certain situations.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T16:03:22.816Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://gist.github.com/ariard/fb432a9d2cd3ba24fdc18ccc8c5c6eb4",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Prior to 0.10.0-beta, LND (Lightning Network Daemon) would have accepted a counterparty high-S signature and broadcast tx-relay invalid local commitment/HTLC transactions. This can be exploited by any peer with an open channel regardless of the victim situation (e.g., routing node, payment-receiver, or payment-sender). The impact is a loss of funds in certain situations.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-10-21T02:00:23",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://gist.github.com/ariard/fb432a9d2cd3ba24fdc18ccc8c5c6eb4",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-26895",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Prior to 0.10.0-beta, LND (Lightning Network Daemon) would have accepted a counterparty high-S signature and broadcast tx-relay invalid local commitment/HTLC transactions. This can be exploited by any peer with an open channel regardless of the victim situation (e.g., routing node, payment-receiver, or payment-sender). The impact is a loss of funds in certain situations.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://gist.github.com/ariard/fb432a9d2cd3ba24fdc18ccc8c5c6eb4",
                     refsource: "MISC",
                     url: "https://gist.github.com/ariard/fb432a9d2cd3ba24fdc18ccc8c5c6eb4",
                  },
                  {
                     name: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html",
                     refsource: "MISC",
                     url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html",
                  },
                  {
                     name: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html",
                     refsource: "MISC",
                     url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-26895",
      datePublished: "2020-10-21T02:00:23",
      dateReserved: "2020-10-09T00:00:00",
      dateUpdated: "2024-08-04T16:03:22.816Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2020-10-21 02:15
Modified
2024-11-21 05:20
Summary
Prior to 0.11.0-beta, LND (Lightning Network Daemon) had a vulnerability in its invoice database. While claiming on-chain a received HTLC output, it didn't verify that the corresponding outgoing off-chain HTLC was already settled before releasing the preimage. In the case of a hash-and-amount collision with an invoice, the preimage for an expected payment was instead released. A malicious peer could have deliberately intercepted an HTLC intended for the victim node, probed the preimage through a colluding relayed HTLC, and stolen the intercepted HTLC. The impact is a loss of funds in certain situations, and a weakening of the victim's receiver privacy.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB979325-5104-42AC-88E7-86340DEAABB6",
                     versionEndExcluding: "0.11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "471DB911-D351-4192-BB35-22F05EF59336",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.0:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "C3D61839-7705-455E-8B4B-09EA2D546FDA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.0:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "32789438-5E6E-4B67-B61D-41FD65DF97C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.0:beta_rc3:*:*:*:*:*:*",
                     matchCriteriaId: "CFD3719E-B0B0-4F54-8C05-B4F1DD0ED060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.0:beta_rc4:*:*:*:*:*:*",
                     matchCriteriaId: "ACA6F2D1-385C-49AA-B1FF-FD406501E0F4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Prior to 0.11.0-beta, LND (Lightning Network Daemon) had a vulnerability in its invoice database. While claiming on-chain a received HTLC output, it didn't verify that the corresponding outgoing off-chain HTLC was already settled before releasing the preimage. In the case of a hash-and-amount collision with an invoice, the preimage for an expected payment was instead released. A malicious peer could have deliberately intercepted an HTLC intended for the victim node, probed the preimage through a colluding relayed HTLC, and stolen the intercepted HTLC. The impact is a loss of funds in certain situations, and a weakening of the victim's receiver privacy.",
      },
      {
         lang: "es",
         value: "Antes de la versión 0.11.0-beta, LND (Lightning Network Daemon) tenía una vulnerabilidad en su base de datos de facturas. Mientras reclamaba en cadena una salida HTLC recibida, no verificaba que la correspondiente salida HTLC fuera de cadena ya estaba resuelta antes de liberar la preimagen. En el caso de una colisión de hachís con una factura, la imagen previa para un pago esperado fue liberada. Un par malintencionado podría haber interceptado deliberadamente un HTLC destinado al nodo víctima, sondeado la imagen previa a través de un HTLC retransmitido y robado el HTLC interceptado. El impacto es una pérdida de fondos en ciertas situaciones, y un debilitamiento de la privacidad del receptor de la víctima",
      },
   ],
   id: "CVE-2020-26896",
   lastModified: "2024-11-21T05:20:26.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 8.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "LOW",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-10-21T02:15:12.737",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://gist.github.com/ariard/6bdeb995565d1cc292753e1ee4ae402d",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://gist.github.com/ariard/6bdeb995565d1cc292753e1ee4ae402d",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-354",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-11-07 04:15
Modified
2024-11-21 07:28
Severity ?
Summary
btcd before 0.23.2, as used in Lightning Labs lnd before 0.15.2-beta and other Bitcoin-related products, mishandles witness size checking.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E378CBBF-D617-43FF-B5C4-E3A0204F1039",
                     versionEndExcluding: "0.23.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "549EFCEE-BB9C-4E12-9C15-BDBCF9A1792B",
                     versionEndExcluding: "0.15.2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "btcd before 0.23.2, as used in Lightning Labs lnd before 0.15.2-beta and other Bitcoin-related products, mishandles witness size checking.",
      },
      {
         lang: "es",
         value: "btcd anterior a 0.23.2, como se usa en Lightning Labs lnd anterior a 0.15.2-beta y otros productos relacionados con Bitcoin, maneja mal la verificación del tamaño de los testigos.",
      },
   ],
   id: "CVE-2022-44797",
   lastModified: "2024-11-21T07:28:28.360",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-11-07T04:15:09.650",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/btcsuite/btcd/pull/1896",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/btcsuite/btcd/releases/tag/v0.23.2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/issues/7002",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.2-beta",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/btcsuite/btcd/pull/1896",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/btcsuite/btcd/releases/tag/v0.23.2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/issues/7002",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.2-beta",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-10-21 02:15
Modified
2024-11-21 05:20
Summary
Prior to 0.10.0-beta, LND (Lightning Network Daemon) would have accepted a counterparty high-S signature and broadcast tx-relay invalid local commitment/HTLC transactions. This can be exploited by any peer with an open channel regardless of the victim situation (e.g., routing node, payment-receiver, or payment-sender). The impact is a loss of funds in certain situations.
Impacted products
Vendor Product Version
lightning_network_daemon_project lightning_network_daemon 0.1
lightning_network_daemon_project lightning_network_daemon 0.1.1
lightning_network_daemon_project lightning_network_daemon 0.2
lightning_network_daemon_project lightning_network_daemon 0.2.1
lightning_network_daemon_project lightning_network_daemon 0.3
lightning_network_daemon_project lightning_network_daemon 0.4
lightning_network_daemon_project lightning_network_daemon 0.4.1
lightning_network_daemon_project lightning_network_daemon 0.4.2
lightning_network_daemon_project lightning_network_daemon 0.5
lightning_network_daemon_project lightning_network_daemon 0.5
lightning_network_daemon_project lightning_network_daemon 0.5
lightning_network_daemon_project lightning_network_daemon 0.5.1
lightning_network_daemon_project lightning_network_daemon 0.5.1
lightning_network_daemon_project lightning_network_daemon 0.5.1
lightning_network_daemon_project lightning_network_daemon 0.5.1
lightning_network_daemon_project lightning_network_daemon 0.5.1
lightning_network_daemon_project lightning_network_daemon 0.5.2
lightning_network_daemon_project lightning_network_daemon 0.6
lightning_network_daemon_project lightning_network_daemon 0.6
lightning_network_daemon_project lightning_network_daemon 0.6
lightning_network_daemon_project lightning_network_daemon 0.6
lightning_network_daemon_project lightning_network_daemon 0.6
lightning_network_daemon_project lightning_network_daemon 0.6.1
lightning_network_daemon_project lightning_network_daemon 0.6.1
lightning_network_daemon_project lightning_network_daemon 0.6.1
lightning_network_daemon_project lightning_network_daemon 0.7.0
lightning_network_daemon_project lightning_network_daemon 0.7.0
lightning_network_daemon_project lightning_network_daemon 0.7.0
lightning_network_daemon_project lightning_network_daemon 0.7.0
lightning_network_daemon_project lightning_network_daemon 0.7.1
lightning_network_daemon_project lightning_network_daemon 0.7.1
lightning_network_daemon_project lightning_network_daemon 0.7.1
lightning_network_daemon_project lightning_network_daemon 0.8.0
lightning_network_daemon_project lightning_network_daemon 0.8.0
lightning_network_daemon_project lightning_network_daemon 0.8.0
lightning_network_daemon_project lightning_network_daemon 0.8.0
lightning_network_daemon_project lightning_network_daemon 0.8.1
lightning_network_daemon_project lightning_network_daemon 0.8.2
lightning_network_daemon_project lightning_network_daemon 0.8.2
lightning_network_daemon_project lightning_network_daemon 0.8.2
lightning_network_daemon_project lightning_network_daemon 0.9.0
lightning_network_daemon_project lightning_network_daemon 0.9.0
lightning_network_daemon_project lightning_network_daemon 0.9.0
lightning_network_daemon_project lightning_network_daemon 0.9.0
lightning_network_daemon_project lightning_network_daemon 0.9.0
lightning_network_daemon_project lightning_network_daemon 0.9.1
lightning_network_daemon_project lightning_network_daemon 0.9.1
lightning_network_daemon_project lightning_network_daemon 0.9.2
lightning_network_daemon_project lightning_network_daemon 0.10.0
lightning_network_daemon_project lightning_network_daemon 0.10.0
lightning_network_daemon_project lightning_network_daemon 0.10.0
lightning_network_daemon_project lightning_network_daemon 0.10.0
lightning_network_daemon_project lightning_network_daemon 0.10.0
lightning_network_daemon_project lightning_network_daemon 0.10.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.1:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "C806B233-215F-4084-8593-955A1407FC24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.1.1:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "8C8A336E-FB18-4249-8692-78360BF46ECF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.2:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "F1C6DF0D-51A5-4C97-9A5A-45C728395193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.2.1:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "029AC422-BD2C-492B-BEFC-51609F2669C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.3:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "B146A72F-0E21-40AC-A822-70D43E927AEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.4:beta:*:*:*:*:*:*",
                     matchCriteriaId: "78681B98-6A34-4052-9D8A-66C50C4AB689",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.4.1:beta:*:*:*:*:*:*",
                     matchCriteriaId: "E9658AB1-6590-4D94-84F3-E4CD291C127C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.4.2:beta:*:*:*:*:*:*",
                     matchCriteriaId: "433D9C37-77EE-48CC-B7CE-81F430B05EA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.5:beta:*:*:*:*:*:*",
                     matchCriteriaId: "76EB9B7B-0978-45B7-9AEE-C24B9D247A00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.5:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "93B2A426-190A-4968-A5A0-FF129317E0E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.5:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "D2431C53-AB13-4203-80F6-4AB915C8ADBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.5.1:beta:*:*:*:*:*:*",
                     matchCriteriaId: "2B6F9135-0553-4B11-AC98-AC745DDFF03B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.5.1:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "74CB5F88-DDD2-4FEF-81E5-D9696E06FD21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.5.1:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "D41220F2-D900-48A9-9328-95DE340A7B51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.5.1:beta_rc3:*:*:*:*:*:*",
                     matchCriteriaId: "EF01EEA5-E7B8-4F8F-BD23-9D06036A5F40",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.5.1:beta_rc4:*:*:*:*:*:*",
                     matchCriteriaId: "9047955C-DF64-4E86-A731-E37F1830DD2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.5.2:beta:*:*:*:*:*:*",
                     matchCriteriaId: "E32A8035-28FD-4888-99CC-BEFC7E20AD31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.6:beta:*:*:*:*:*:*",
                     matchCriteriaId: "A28A504C-80CF-4E79-8674-AA097A19F9E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.6:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "A8B53F63-E9B6-49AB-9418-E16EF23BDE16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.6:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "A87FD870-754A-4167-AF21-3986E4A0BAF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.6:beta_rc3:*:*:*:*:*:*",
                     matchCriteriaId: "054B141D-B389-4FB7-BE0E-D1D487EBE0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.6:beta_rc4:*:*:*:*:*:*",
                     matchCriteriaId: "895EB24D-00D4-4B67-AB5B-16101652FCD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.6.1:beta:*:*:*:*:*:*",
                     matchCriteriaId: "25AB5F82-9C4D-41AC-9FB0-B76D39E9EF20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.6.1:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "E0E83B03-6414-41D7-9F2B-1C07E8A18640",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.6.1:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "E089FE96-A770-4911-8237-311110C11830",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.7.0:beta:*:*:*:*:*:*",
                     matchCriteriaId: "22E617BA-4449-490E-B0F9-B532AA6EABA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.7.0:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "16819283-EDE0-4414-BE6F-402F90E28662",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.7.0:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "C02718A4-09D0-4850-B06C-C46C70BD6E3C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.7.0:beta_rc3:*:*:*:*:*:*",
                     matchCriteriaId: "63E8A06A-03CE-4E65-B808-737951FDE894",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.7.1:beta:*:*:*:*:*:*",
                     matchCriteriaId: "83203CF6-9E9A-44EA-894C-AF1EA8A2FD72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.7.1:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "E2E7AEE3-A6B1-4AAC-825E-143318600E43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.7.1:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "8FDEE520-4686-4DD2-93AD-176514836526",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.8.0:beta:*:*:*:*:*:*",
                     matchCriteriaId: "0A9A39B1-E7FC-47E1-A19C-5CF8B180A377",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.8.0:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "920FAC21-00D8-408B-9371-7F0F17B75D10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.8.0:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "064AFCE6-B8FE-4213-BEF6-C1749F5D108D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.8.0:beta_rc3:*:*:*:*:*:*",
                     matchCriteriaId: "2757E731-97D4-4F32-8526-9E98A2E309E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.8.1:beta:*:*:*:*:*:*",
                     matchCriteriaId: "9EEF60FF-01B5-4112-A29A-89ADF6D9398C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.8.2:beta:*:*:*:*:*:*",
                     matchCriteriaId: "FE6C68BC-BF65-4DEF-82A3-D4B7DF0E152E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.8.2:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "9DCD2B37-8BA7-4588-9302-2E02D2C82A66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.8.2:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "7A85DF0B-DDC2-4D88-8288-AB9BDBFF8C8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.9.0:beta:*:*:*:*:*:*",
                     matchCriteriaId: "BEA29F2A-41FC-411D-9870-414DED92403A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.9.0:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "BAB8D1AF-6FCD-41E5-89E0-BE4AD9935718",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.9.0:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "A49E923C-86E0-411E-90F7-84829D773BC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.9.0:beta_rc3:*:*:*:*:*:*",
                     matchCriteriaId: "2A59417E-1206-42A8-B06A-857FE7419835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.9.0:beta_rc4:*:*:*:*:*:*",
                     matchCriteriaId: "2C2AE7AD-2056-4411-8E64-DC07B90FDD88",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.9.1:beta:*:*:*:*:*:*",
                     matchCriteriaId: "C55FA144-972F-4614-B344-F733C5DC9ACA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.9.1:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "422108E5-3C8E-4101-9664-B39564C34DC5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.9.2:beta:*:*:*:*:*:*",
                     matchCriteriaId: "D853D090-E408-4BE7-A28C-18BFB328AC41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.10.0:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "E91EDB73-AD09-47A2-87F7-AB7CA80CBAF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.10.0:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "F032C09F-555B-4726-AF31-3E26A337222F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.10.0:beta_rc3:*:*:*:*:*:*",
                     matchCriteriaId: "6D0927FD-C0FD-474F-8F4C-A2C41D8BF08E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.10.0:beta_rc4:*:*:*:*:*:*",
                     matchCriteriaId: "351537F0-84DE-4EB2-AF66-1F547B0ECAC2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.10.0:beta_rc5:*:*:*:*:*:*",
                     matchCriteriaId: "DDA39AA1-3C63-4CA3-BD91-A1870FCB53F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.10.0:beta_rc6:*:*:*:*:*:*",
                     matchCriteriaId: "A4A9F188-EF5C-44E7-9893-B81AA851B203",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Prior to 0.10.0-beta, LND (Lightning Network Daemon) would have accepted a counterparty high-S signature and broadcast tx-relay invalid local commitment/HTLC transactions. This can be exploited by any peer with an open channel regardless of the victim situation (e.g., routing node, payment-receiver, or payment-sender). The impact is a loss of funds in certain situations.",
      },
      {
         lang: "es",
         value: "Antes de la versión 0.10.0-beta, el LND (Lightning Network Daemon) habría aceptado una firma de contrapartida de alta-S y transmitido transacciones de compromiso local/HTLC inválidas de retransmisión tx. Esto puede ser explotado por cualquier par con un canal abierto, independientemente de la situación de la víctima (por ejemplo, nodo de enrutamiento, pagador-receptor o pagador-emisor). El impacto es una pérdida de fondos en ciertas situaciones",
      },
   ],
   id: "CVE-2020-26895",
   lastModified: "2024-11-21T05:20:26.040",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-10-21T02:15:12.660",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://gist.github.com/ariard/fb432a9d2cd3ba24fdc18ccc8c5c6eb4",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://gist.github.com/ariard/fb432a9d2cd3ba24fdc18ccc8c5c6eb4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-354",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-11-17 22:15
Modified
2024-11-21 07:18
Summary
Lightning Network Daemon (lnd) is an implementation of a lightning bitcoin overlay network node. All lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected. This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC. A patch is available in `lnd` version 0.15.4. Users are advised to upgrade. Users unable to upgrade may use the `lncli updatechanpolicy` RPC call to increase their CLTV value to a very high amount or increase their fee policies. This will prevent nodes from routing through your node, meaning that no pending HTLCs can be present.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C76213E-2BE3-4BF3-B5D1-2AA9B6BB0A95",
                     versionEndExcluding: "0.23.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4F9DC3C-AC0A-472A-B74E-2966F1B7D3A9",
                     versionEndExcluding: "0.15.4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Lightning Network Daemon (lnd) is an implementation of a lightning bitcoin overlay network node. All lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected. This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC. A patch is available in `lnd` version 0.15.4. Users are advised to upgrade. Users unable to upgrade may use the `lncli updatechanpolicy` RPC call to increase their CLTV value to a very high amount or increase their fee policies. This will prevent nodes from routing through your node, meaning that no pending HTLCs can be present.",
      },
      {
         lang: "es",
         value: "Lightning Network Daemon (lnd) es una implementación de un nodo de red superpuesto de bitcoin relámpago. Todos los nodos lnd anteriores a la versión `v0.15.4` son vulnerables a un error de análisis de bloques que puede hacer que un nodo entre en un estado degradado una vez encontrado. En este estado degradado, los nodos pueden continuar realizando pagos y reenviando HTLC y cerrar canales. Está prohibido abrir canales y tampoco se detectarán eventos de transacciones en cadena. Esto puede provocar la pérdida de fondos si se investiga el vencimiento de un CSV durante un intento de infracción o si un delta de CLTV expira olvidándose de los fondos en el HTLC. Hay un parche disponible en la versión 0.15.4 de `lnd`. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar pueden usar la llamada RPC `lncli updatechanpolicy` para aumentar su valor CLTV a una cantidad muy alta o aumentar sus políticas de tarifas. Esto evitará que los nodos se enruten a través de su nodo, lo que significa que no puede haber ningún HTLC pendiente.",
      },
   ],
   id: "CVE-2022-39389",
   lastModified: "2024-11-21T07:18:11.677",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.2,
            source: "security-advisories@github.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.5,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-11-17T22:15:10.547",
   references: [
      {
         source: "security-advisories@github.com",
         tags: [
            "Exploit",
            "Issue Tracking",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/issues/7096",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/pull/7098",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.4-beta",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/security/advisories/GHSA-hc82-w9v8-83pr",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Issue Tracking",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/issues/7096",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/pull/7098",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.4-beta",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/security/advisories/GHSA-hc82-w9v8-83pr",
      },
   ],
   sourceIdentifier: "security-advisories@github.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "security-advisories@github.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-10-04 17:15
Modified
2024-11-21 06:26
Summary
Lightning Labs lnd before 0.13.3-beta allows loss of funds because of dust HTLC exposure.
References
cve@mitre.orghttps://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixingPress/Media Coverage, Third Party Advisory
cve@mitre.orghttps://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.mdRelease Notes, Third Party Advisory
cve@mitre.orghttps://github.com/lightningnetwork/lnd/releases/tag/v0.13.3-betaThird Party Advisory
cve@mitre.orghttps://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.htmlMailing List, Vendor Advisory
cve@mitre.orghttps://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.htmlMailing List, Vendor Advisory
cve@mitre.orghttps://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.htmlExploit, Mailing List, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixingPress/Media Coverage, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.mdRelease Notes, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/lightningnetwork/lnd/releases/tag/v0.13.3-betaThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.htmlMailing List, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.htmlMailing List, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.htmlExploit, Mailing List, Vendor Advisory
Impacted products
Vendor Product Version
lightning_network_daemon_project lightning_network_daemon *
lightning_network_daemon_project lightning_network_daemon 0.11.0
lightning_network_daemon_project lightning_network_daemon 0.11.0
lightning_network_daemon_project lightning_network_daemon 0.11.0
lightning_network_daemon_project lightning_network_daemon 0.11.0
lightning_network_daemon_project lightning_network_daemon 0.11.0
lightning_network_daemon_project lightning_network_daemon 0.11.0
lightning_network_daemon_project lightning_network_daemon 0.11.1
lightning_network_daemon_project lightning_network_daemon 0.11.1
lightning_network_daemon_project lightning_network_daemon 0.11.1
lightning_network_daemon_project lightning_network_daemon 0.11.1
lightning_network_daemon_project lightning_network_daemon 0.11.1
lightning_network_daemon_project lightning_network_daemon 0.11.1
lightning_network_daemon_project lightning_network_daemon 0.12.0
lightning_network_daemon_project lightning_network_daemon 0.12.0
lightning_network_daemon_project lightning_network_daemon 0.12.0
lightning_network_daemon_project lightning_network_daemon 0.12.0
lightning_network_daemon_project lightning_network_daemon 0.12.0
lightning_network_daemon_project lightning_network_daemon 0.12.0
lightning_network_daemon_project lightning_network_daemon 0.12.0
lightning_network_daemon_project lightning_network_daemon 0.12.1
lightning_network_daemon_project lightning_network_daemon 0.12.1
lightning_network_daemon_project lightning_network_daemon 0.12.1
lightning_network_daemon_project lightning_network_daemon 0.12.1
lightning_network_daemon_project lightning_network_daemon 0.12.1
lightning_network_daemon_project lightning_network_daemon 0.12.1
lightning_network_daemon_project lightning_network_daemon 0.12.1
lightning_network_daemon_project lightning_network_daemon 0.13.0
lightning_network_daemon_project lightning_network_daemon 0.13.0
lightning_network_daemon_project lightning_network_daemon 0.13.0
lightning_network_daemon_project lightning_network_daemon 0.13.0
lightning_network_daemon_project lightning_network_daemon 0.13.0
lightning_network_daemon_project lightning_network_daemon 0.13.0
lightning_network_daemon_project lightning_network_daemon 0.13.1
lightning_network_daemon_project lightning_network_daemon 0.13.1
lightning_network_daemon_project lightning_network_daemon 0.13.1
lightning_network_daemon_project lightning_network_daemon 0.13.2
lightning_network_daemon_project lightning_network_daemon 0.13.3



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB979325-5104-42AC-88E7-86340DEAABB6",
                     versionEndExcluding: "0.11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "471DB911-D351-4192-BB35-22F05EF59336",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.0:beta:*:*:*:*:*:*",
                     matchCriteriaId: "937CFB7C-FFAC-4F4D-983F-CA8B7D82708C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.0:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "C3D61839-7705-455E-8B4B-09EA2D546FDA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.0:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "32789438-5E6E-4B67-B61D-41FD65DF97C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.0:beta_rc3:*:*:*:*:*:*",
                     matchCriteriaId: "CFD3719E-B0B0-4F54-8C05-B4F1DD0ED060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.0:beta_rc4:*:*:*:*:*:*",
                     matchCriteriaId: "ACA6F2D1-385C-49AA-B1FF-FD406501E0F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.1:beta:*:*:*:*:*:*",
                     matchCriteriaId: "98C3E716-D19F-45D5-A7FC-643205CE9B50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.1:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "344573D1-98AA-4A6E-AB48-9210704DCE9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.1:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "2CB65C60-08EF-4792-9133-7231EF5AA9F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.1:beta_rc3:*:*:*:*:*:*",
                     matchCriteriaId: "1D04103A-91BD-4F6F-93AD-638E9545AE72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.1:beta_rc4:*:*:*:*:*:*",
                     matchCriteriaId: "A7E91F95-ED04-4C07-9322-2A1275FB93F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.1:beta_rc5:*:*:*:*:*:*",
                     matchCriteriaId: "E5FFF05B-177A-48B2-B759-A8CBF2ECA0A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.0:beta:*:*:*:*:*:*",
                     matchCriteriaId: "81C43283-8E21-4374-B408-0D6FDAF16276",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.0:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "3890F9F4-9A45-43D5-AE14-D5101B38DCD5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.0:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "41669B1F-0974-4B82-9407-30AFD666F680",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.0:beta_rc3:*:*:*:*:*:*",
                     matchCriteriaId: "D7B5F168-A323-4BBF-B56B-207C0FA0026E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.0:beta_rc4:*:*:*:*:*:*",
                     matchCriteriaId: "5B66CB82-5610-47DE-8386-DE92A8CB74EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.0:beta_rc5:*:*:*:*:*:*",
                     matchCriteriaId: "24553FDA-5BA6-423C-AA6D-16C237319008",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.0:beta_rc6:*:*:*:*:*:*",
                     matchCriteriaId: "8E56F4CC-2788-4908-B6F5-9A478947728E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.1:beta:*:*:*:*:*:*",
                     matchCriteriaId: "7C116930-4D96-44CE-BA36-F95FB5742309",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.1:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "04C42FF4-E3C5-4E46-99D5-06C5ECE2E738",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.1:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "D4D87CA7-6645-49F2-AF55-40D729AFD7D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.1:beta_rc3:*:*:*:*:*:*",
                     matchCriteriaId: "E60FEE7A-E583-4739-B3F4-51B3CFF2CB70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.1:beta_rc4:*:*:*:*:*:*",
                     matchCriteriaId: "190CF45C-1B3D-4F7D-905C-0BC94A92F6FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.1:beta_rc5:*:*:*:*:*:*",
                     matchCriteriaId: "0C93521F-0B51-4455-BFE6-DBA680EB992F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.1:beta_rc6:*:*:*:*:*:*",
                     matchCriteriaId: "B19A9CFC-F58D-4579-8B57-5A17BA37C0FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.0:beta:*:*:*:*:*:*",
                     matchCriteriaId: "EC8B17BD-8E10-4257-BCE5-D9A68716F0A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.0:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "FFE18D77-2EB5-4483-9679-89D5A24754B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.0:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "D41C4C60-4897-458F-907C-C652FA098EF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.0:beta_rc3:*:*:*:*:*:*",
                     matchCriteriaId: "2AFE1F4F-79B9-4C3F-93EA-861EDD401072",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.0:beta_rc4:*:*:*:*:*:*",
                     matchCriteriaId: "F0B78D94-7B5B-42D9-9972-9E75DFA2359D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.0:beta_rc5:*:*:*:*:*:*",
                     matchCriteriaId: "DCBE1B35-C6B2-43E9-91DA-42C58D10BA9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.1:beta:*:*:*:*:*:*",
                     matchCriteriaId: "75053769-64A8-444D-95BC-B39E13F35FE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.1:beta_rc1:*:*:*:*:*:*",
                     matchCriteriaId: "0D0E8E08-7D15-4B82-B693-E386EB4E19AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.1:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "2CBE0562-84DC-4DCA-8B73-7E32CCA2D278",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.2:beta:*:*:*:*:*:*",
                     matchCriteriaId: "25363F37-CB45-48F7-9361-C77A5B43C48F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.3:beta_rc2:*:*:*:*:*:*",
                     matchCriteriaId: "0E6093F1-9A1E-470B-9991-11F0195EC544",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Lightning Labs lnd before 0.13.3-beta allows loss of funds because of dust HTLC exposure.",
      },
      {
         lang: "es",
         value: "Lightning Labs lnd versiones anteriores a 0.13.3-beta, permite una pérdida de fondos debido a una exposición del polvo HTLC",
      },
   ],
   id: "CVE-2021-41593",
   lastModified: "2024-11-21T06:26:29.647",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 8.6,
               baseSeverity: "HIGH",
               confidentialityImpact: "LOW",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-10-04T17:15:08.727",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.md",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.13.3-beta",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Press/Media Coverage",
            "Third Party Advisory",
         ],
         url: "https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.md",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.13.3-beta",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-770",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}