Prior to 0.10.0-beta, LND (Lightning Network Daemon) would have accepted a counterparty high-S signature and broadcast tx-relay invalid local commitment/HTLC transactions. This can be exploited by any peer with an open channel regardless of the victim situation (e.g., routing node, payment-receiver, or payment-sender). The impact is a loss of funds in certain situations.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 3.1 | 5.3 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
| Primary | 2.0 | 5.0 | MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
| Hyperlink | Source | Resource |
|---|---|---|
| https://gist.github.com/ariard/fb432a9d2cd3ba24fdc18ccc8c5c6eb4 | cve@mitre.org | Third Party Advisory |
| https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html | cve@mitre.org | Mailing List Third Party Advisory |
| https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html | cve@mitre.org | Mailing List Third Party Advisory |