Show filters
14 Total Results
Displaying 11-14 of 14
Sort by:
Attacker Value
Unknown
CVE-2020-26896
Disclosure Date: October 21, 2020 (last updated February 22, 2025)
Prior to 0.11.0-beta, LND (Lightning Network Daemon) had a vulnerability in its invoice database. While claiming on-chain a received HTLC output, it didn't verify that the corresponding outgoing off-chain HTLC was already settled before releasing the preimage. In the case of a hash-and-amount collision with an invoice, the preimage for an expected payment was instead released. A malicious peer could have deliberately intercepted an HTLC intended for the victim node, probed the preimage through a colluding relayed HTLC, and stolen the intercepted HTLC. The impact is a loss of funds in certain situations, and a weakening of the victim's receiver privacy.
0
Attacker Value
Unknown
CVE-2020-26895
Disclosure Date: October 21, 2020 (last updated February 22, 2025)
Prior to 0.10.0-beta, LND (Lightning Network Daemon) would have accepted a counterparty high-S signature and broadcast tx-relay invalid local commitment/HTLC transactions. This can be exploited by any peer with an open channel regardless of the victim situation (e.g., routing node, payment-receiver, or payment-sender). The impact is a loss of funds in certain situations.
0
Attacker Value
Unknown
CVE-2020-7747
Disclosure Date: October 20, 2020 (last updated February 22, 2025)
This affects all versions of package lightning-server. It is possible to inject malicious JavaScript code as part of a session controller.
0
Attacker Value
Unknown
CVE-2019-12998
Disclosure Date: January 31, 2020 (last updated February 21, 2025)
c-lightning before 0.7.1 allows attackers to trigger loss of funds because of Incorrect Access Control. NOTE: README.md states "It can be used for testing, but it should not be used for real funds."
0