Vulnerability Description
CryptoNote version version 0.8.9 and possibly later contain a local RPC server which does not require authentication, as a result the walletd and the simplewallet RPC daemons will process any commands sent to them, resulting in remote command execution and a takeover of the cryptocurrency wallet if an attacker can trick an application such as a web browser into connecting and sending a command for example. This attack appears to be exploitable via a victim visiting a webpage hosting malicious content that trigger such behavior.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cryptonote | Cryptonote | <= 0.8.9 |
Related Weaknesses (CWE)
References
- https://github.com/amjuarez/bytecoin/issues/217Broken LinkThird Party Advisory
- https://github.com/cryptonotefoundation/cryptonote/issues/172ExploitIssue TrackingThird Party Advisory
- https://www.ayrx.me/cryptonote-unauthenticated-json-rpcExploitThird Party Advisory
- https://github.com/amjuarez/bytecoin/issues/217Broken LinkThird Party Advisory
- https://github.com/cryptonotefoundation/cryptonote/issues/172ExploitIssue TrackingThird Party Advisory
- https://www.ayrx.me/cryptonote-unauthenticated-json-rpcExploitThird Party Advisory
FAQ
What is CVE-2018-1000093?
CVE-2018-1000093 is a vulnerability with a CVSS score of 8.8 (HIGH). CryptoNote version version 0.8.9 and possibly later contain a local RPC server which does not require authentication, as a result the walletd and the simplewallet RPC daemons will process any commands...
How severe is CVE-2018-1000093?
CVE-2018-1000093 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1000093?
Check the references section above for vendor advisories and patch information. Affected products include: Cryptonote Cryptonote.