Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/tharsis/evmos
  4. ›
  5. CVE-2022-24738

CVE-2022-24738: Account compromise in Evmos

March 7, 2022 (updated March 8, 2022)

Evmos is the Ethereum Virtual Machine (EVM) Hub on the Cosmos Network. In versions of evmos prior to 2.0.1 attackers are able to drain unclaimed funds from user addresses. To do this an attacker must create a new chain which does not enforce signature verification and connects it to the target evmos instance. The attacker can use this joined chain to transfer unclaimed funds. Users are advised to upgrade.

References

  • github.com/advisories/GHSA-5jgq-x857-p8xw
  • github.com/tharsis/evmos/commit/28870258d4ee9f1b8aeef5eba891681f89348f71
  • github.com/tharsis/evmos/releases/tag/v2.0.1
  • github.com/tharsis/evmos/security/advisories/GHSA-5jgq-x857-p8xw
  • nvd.nist.gov/vuln/detail/CVE-2022-24738

Code Behaviors & Features

Detect and mitigate CVE-2022-24738 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.0.1

Fixed versions

  • v2.0.1

Solution

Upgrade to version 2.0.1 or above.

Impact 7.4 HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Source file

go/github.com/tharsis/evmos/CVE-2022-24738.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:52 +0000.