Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-24759: CWE-347: Improper Verification of Cryptographic Signature in ChainSafe js-libp2p-noise

0
Medium
Published: Thu Mar 17 2022 (03/17/2022, 16:40:11 UTC)
Source: CVE
Vendor/Project: ChainSafe
Product: js-libp2p-noise

Description

`@chainsafe/libp2p-noise` contains TypeScript implementation of noise protocol, an encryption protocol used in libp2p. `@chainsafe/libp2p-noise` before 4.1.2 and 5.0.3 does not correctly validate signatures during the handshake process. This may allow a man-in-the-middle to pose as other peers and get those peers banned. Users should upgrade to version 4.1.2 or 5.0.3 to receive a patch. There are currently no known workarounds.

AI-Powered Analysis

AILast updated: 06/23/2025, 13:20:58 UTC

Technical Analysis

CVE-2022-24759 is a vulnerability identified in the ChainSafe project's JavaScript implementation of the Noise Protocol within the @chainsafe/libp2p-noise library. The Noise Protocol is a cryptographic handshake protocol widely used in peer-to-peer (P2P) networking frameworks, including libp2p, which underpins decentralized applications and blockchain networks. This vulnerability arises from improper verification of cryptographic signatures during the handshake process, classified under CWE-347 (Improper Verification of Cryptographic Signature). Specifically, versions of @chainsafe/libp2p-noise prior to 4.1.2 and versions from 5.0.0 up to but not including 5.0.3 fail to correctly validate the authenticity of peer signatures. This flaw can be exploited by a man-in-the-middle (MITM) attacker who can impersonate legitimate peers during the handshake, potentially causing the targeted peers to be banned or disconnected from the network. While the vulnerability does not directly disclose sensitive information or allow arbitrary code execution, it undermines the integrity and trust model of the P2P network by enabling identity spoofing and denial of service against peers. No known exploits have been reported in the wild, and no effective workarounds exist other than upgrading to patched versions 4.1.2 or 5.0.3. The issue affects decentralized applications and services relying on libp2p networking stacks that use the vulnerable versions of js-libp2p-noise, which is common in blockchain nodes, distributed storage systems, and other P2P communication platforms.

Potential Impact

For European organizations, the impact of this vulnerability can be significant in sectors relying on decentralized and P2P technologies, such as blockchain-based financial services, distributed ledger technology (DLT) platforms, and decentralized storage or communication networks. The improper signature verification can allow attackers to impersonate legitimate nodes, leading to network partitioning, denial of service, or disruption of consensus mechanisms in blockchain networks. This can result in degraded service availability, loss of trust in network integrity, and potential financial losses or regulatory compliance issues, especially in critical infrastructure or financial sectors. Furthermore, organizations using libp2p-based solutions for secure communications or data exchange may face increased risk of targeted attacks that exploit this flaw to isolate or ban legitimate peers, impacting operational continuity. Although no direct data breach or code execution is enabled by this vulnerability, the undermining of cryptographic handshake integrity poses a medium-level threat to confidentiality and availability within affected networks.

Mitigation Recommendations

The primary and only effective mitigation is to upgrade the @chainsafe/libp2p-noise library to version 4.1.2 or 5.0.3 or later, where the signature verification flaw has been corrected. Organizations should conduct an inventory of all applications and services using libp2p networking stacks and identify those incorporating vulnerable versions of js-libp2p-noise. Given the lack of workarounds, patch management processes must prioritize this upgrade. Additionally, organizations should implement network monitoring to detect unusual peer banning or disconnection patterns that may indicate exploitation attempts. Employing layered network security controls such as anomaly detection on P2P traffic and strict peer authentication policies can help mitigate the risk of MITM attacks. For blockchain and DLT operators, validating node behavior and consensus integrity post-upgrade is recommended to ensure network stability. Finally, organizations should engage with their software vendors or open-source communities to track further updates or advisories related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-02-10T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf296e

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 1:20:58 PM

Last updated: 2/2/2026, 9:10:59 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2026-20422: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20421: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20420: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8676, MT8791

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20419: CWE-754 Improper Check for Unusual or Exceptional Conditions in MediaTek, Inc. MT6890, MT6989TB, MT7902, MT7915, MT7916, MT7920, MT7921, MT7922, MT7925, MT7927, MT7981, MT7986, MT8196, MT8668, MT8676, MT8678, MT8775, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893, MT8910

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20418: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT7931, MT7933

Unknown
VulnerabilityMon Feb 02 2026

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats