CVE-2022-24759: CWE-347: Improper Verification of Cryptographic Signature in ChainSafe js-libp2p-noise
`@chainsafe/libp2p-noise` contains TypeScript implementation of noise protocol, an encryption protocol used in libp2p. `@chainsafe/libp2p-noise` before 4.1.2 and 5.0.3 does not correctly validate signatures during the handshake process. This may allow a man-in-the-middle to pose as other peers and get those peers banned. Users should upgrade to version 4.1.2 or 5.0.3 to receive a patch. There are currently no known workarounds.
AI Analysis
Technical Summary
CVE-2022-24759 is a vulnerability identified in the ChainSafe project's JavaScript implementation of the Noise Protocol within the @chainsafe/libp2p-noise library. The Noise Protocol is a cryptographic handshake protocol widely used in peer-to-peer (P2P) networking frameworks, including libp2p, which underpins decentralized applications and blockchain networks. This vulnerability arises from improper verification of cryptographic signatures during the handshake process, classified under CWE-347 (Improper Verification of Cryptographic Signature). Specifically, versions of @chainsafe/libp2p-noise prior to 4.1.2 and versions from 5.0.0 up to but not including 5.0.3 fail to correctly validate the authenticity of peer signatures. This flaw can be exploited by a man-in-the-middle (MITM) attacker who can impersonate legitimate peers during the handshake, potentially causing the targeted peers to be banned or disconnected from the network. While the vulnerability does not directly disclose sensitive information or allow arbitrary code execution, it undermines the integrity and trust model of the P2P network by enabling identity spoofing and denial of service against peers. No known exploits have been reported in the wild, and no effective workarounds exist other than upgrading to patched versions 4.1.2 or 5.0.3. The issue affects decentralized applications and services relying on libp2p networking stacks that use the vulnerable versions of js-libp2p-noise, which is common in blockchain nodes, distributed storage systems, and other P2P communication platforms.
Potential Impact
For European organizations, the impact of this vulnerability can be significant in sectors relying on decentralized and P2P technologies, such as blockchain-based financial services, distributed ledger technology (DLT) platforms, and decentralized storage or communication networks. The improper signature verification can allow attackers to impersonate legitimate nodes, leading to network partitioning, denial of service, or disruption of consensus mechanisms in blockchain networks. This can result in degraded service availability, loss of trust in network integrity, and potential financial losses or regulatory compliance issues, especially in critical infrastructure or financial sectors. Furthermore, organizations using libp2p-based solutions for secure communications or data exchange may face increased risk of targeted attacks that exploit this flaw to isolate or ban legitimate peers, impacting operational continuity. Although no direct data breach or code execution is enabled by this vulnerability, the undermining of cryptographic handshake integrity poses a medium-level threat to confidentiality and availability within affected networks.
Mitigation Recommendations
The primary and only effective mitigation is to upgrade the @chainsafe/libp2p-noise library to version 4.1.2 or 5.0.3 or later, where the signature verification flaw has been corrected. Organizations should conduct an inventory of all applications and services using libp2p networking stacks and identify those incorporating vulnerable versions of js-libp2p-noise. Given the lack of workarounds, patch management processes must prioritize this upgrade. Additionally, organizations should implement network monitoring to detect unusual peer banning or disconnection patterns that may indicate exploitation attempts. Employing layered network security controls such as anomaly detection on P2P traffic and strict peer authentication policies can help mitigate the risk of MITM attacks. For blockchain and DLT operators, validating node behavior and consensus integrity post-upgrade is recommended to ensure network stability. Finally, organizations should engage with their software vendors or open-source communities to track further updates or advisories related to this vulnerability.
Affected Countries
Germany, Netherlands, Switzerland, France, United Kingdom, Estonia, Luxembourg
CVE-2022-24759: CWE-347: Improper Verification of Cryptographic Signature in ChainSafe js-libp2p-noise
Description
`@chainsafe/libp2p-noise` contains TypeScript implementation of noise protocol, an encryption protocol used in libp2p. `@chainsafe/libp2p-noise` before 4.1.2 and 5.0.3 does not correctly validate signatures during the handshake process. This may allow a man-in-the-middle to pose as other peers and get those peers banned. Users should upgrade to version 4.1.2 or 5.0.3 to receive a patch. There are currently no known workarounds.
AI-Powered Analysis
Technical Analysis
CVE-2022-24759 is a vulnerability identified in the ChainSafe project's JavaScript implementation of the Noise Protocol within the @chainsafe/libp2p-noise library. The Noise Protocol is a cryptographic handshake protocol widely used in peer-to-peer (P2P) networking frameworks, including libp2p, which underpins decentralized applications and blockchain networks. This vulnerability arises from improper verification of cryptographic signatures during the handshake process, classified under CWE-347 (Improper Verification of Cryptographic Signature). Specifically, versions of @chainsafe/libp2p-noise prior to 4.1.2 and versions from 5.0.0 up to but not including 5.0.3 fail to correctly validate the authenticity of peer signatures. This flaw can be exploited by a man-in-the-middle (MITM) attacker who can impersonate legitimate peers during the handshake, potentially causing the targeted peers to be banned or disconnected from the network. While the vulnerability does not directly disclose sensitive information or allow arbitrary code execution, it undermines the integrity and trust model of the P2P network by enabling identity spoofing and denial of service against peers. No known exploits have been reported in the wild, and no effective workarounds exist other than upgrading to patched versions 4.1.2 or 5.0.3. The issue affects decentralized applications and services relying on libp2p networking stacks that use the vulnerable versions of js-libp2p-noise, which is common in blockchain nodes, distributed storage systems, and other P2P communication platforms.
Potential Impact
For European organizations, the impact of this vulnerability can be significant in sectors relying on decentralized and P2P technologies, such as blockchain-based financial services, distributed ledger technology (DLT) platforms, and decentralized storage or communication networks. The improper signature verification can allow attackers to impersonate legitimate nodes, leading to network partitioning, denial of service, or disruption of consensus mechanisms in blockchain networks. This can result in degraded service availability, loss of trust in network integrity, and potential financial losses or regulatory compliance issues, especially in critical infrastructure or financial sectors. Furthermore, organizations using libp2p-based solutions for secure communications or data exchange may face increased risk of targeted attacks that exploit this flaw to isolate or ban legitimate peers, impacting operational continuity. Although no direct data breach or code execution is enabled by this vulnerability, the undermining of cryptographic handshake integrity poses a medium-level threat to confidentiality and availability within affected networks.
Mitigation Recommendations
The primary and only effective mitigation is to upgrade the @chainsafe/libp2p-noise library to version 4.1.2 or 5.0.3 or later, where the signature verification flaw has been corrected. Organizations should conduct an inventory of all applications and services using libp2p networking stacks and identify those incorporating vulnerable versions of js-libp2p-noise. Given the lack of workarounds, patch management processes must prioritize this upgrade. Additionally, organizations should implement network monitoring to detect unusual peer banning or disconnection patterns that may indicate exploitation attempts. Employing layered network security controls such as anomaly detection on P2P traffic and strict peer authentication policies can help mitigate the risk of MITM attacks. For blockchain and DLT operators, validating node behavior and consensus integrity post-upgrade is recommended to ensure network stability. Finally, organizations should engage with their software vendors or open-source communities to track further updates or advisories related to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-02-10T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9842c4522896dcbf296e
Added to database: 5/21/2025, 9:09:22 AM
Last enriched: 6/23/2025, 1:20:58 PM
Last updated: 2/2/2026, 9:10:59 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20422: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
UnknownCVE-2026-20421: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791
UnknownCVE-2026-20420: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8676, MT8791
UnknownCVE-2026-20419: CWE-754 Improper Check for Unusual or Exceptional Conditions in MediaTek, Inc. MT6890, MT6989TB, MT7902, MT7915, MT7916, MT7920, MT7921, MT7922, MT7925, MT7927, MT7981, MT7986, MT8196, MT8668, MT8676, MT8678, MT8775, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893, MT8910
UnknownCVE-2026-20418: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT7931, MT7933
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.