Skip to main content

CVE-2022-31006: CWE-400: Uncontrolled Resource Consumption in hyperledger indy-node

Medium
Published: Fri Sep 09 2022 (09/09/2022, 19:10:10 UTC)
Source: CVE
Vendor/Project: hyperledger
Product: indy-node

Description

indy-node is the server portion of Hyperledger Indy, a distributed ledger purpose-built for decentralized identity. In vulnerable versions of indy-node, an attacker can max out the number of client connections allowed by the ledger, leaving the ledger unable to be used for its intended purpose. However, the ledger content will not be impacted and the ledger will resume functioning after the attack. This attack exploits the trade-off between resilience and availability. Any protection against abusive client connections will also prevent the network being accessed by certain legitimate users. As a result, validator nodes must tune their firewall rules to ensure the right trade-off for their network's expected users. The guidance to network operators for the use of firewall rules in the deployment of Indy networks has been modified to better protect against denial of service attacks by increasing the cost and complexity in mounting such attacks. The mitigation for this vulnerability is not in the Hyperledger Indy code per se, but rather in the individual deployments of Indy. The mitigations should be applied to all deployments of Indy, and are not related to a particular release.

AI-Powered Analysis

AILast updated: 06/22/2025, 22:50:57 UTC

Technical Analysis

CVE-2022-31006 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting hyperledger indy-node, the server component of Hyperledger Indy, a distributed ledger platform designed specifically for decentralized identity management. The vulnerability exists in versions up to and including 1.12.6. An attacker can exploit this flaw by opening and maintaining a large number of client connections to the ledger nodes, effectively exhausting the maximum allowed client connections. This results in a denial of service (DoS) condition where legitimate users are unable to access or use the ledger, although the ledger's data integrity and content remain unaffected. The attack leverages a trade-off inherent in the system's design between resilience and availability: implementing strict protections against abusive client connections risks blocking legitimate users, while lax protections expose the network to resource exhaustion attacks. The vulnerability is not due to a bug in the indy-node code itself but rather arises from deployment configurations, specifically firewall and network access rules. The recommended mitigation involves tuning firewall rules and network policies to balance accessibility and protection, increasing the complexity and cost for attackers to mount such DoS attacks. This guidance has been updated for network operators to better defend against abusive client connections. No patches are provided in the codebase, and no known exploits have been reported in the wild to date.

Potential Impact

For European organizations utilizing Hyperledger Indy for decentralized identity solutions, this vulnerability poses a risk of service disruption. While the ledger's data integrity and confidentiality remain intact, the availability of the ledger can be severely impacted by an attacker saturating client connections. This can halt identity verification processes, credential issuance, and other critical decentralized identity functions, potentially affecting sectors relying on trusted digital identities such as finance, healthcare, government services, and supply chain management. The inability to access the ledger could delay or block essential transactions and identity validations, leading to operational downtime and loss of trust in digital identity infrastructures. Given that the vulnerability requires no code exploitation but rather network-level abuse, organizations with insufficiently hardened network configurations are particularly vulnerable. However, since the ledger resumes normal operation after the attack ceases, the impact is transient but can be disruptive during critical periods.

Mitigation Recommendations

European organizations should implement precise and dynamic firewall rules tailored to their expected user base to limit the number of simultaneous client connections from any single source or subnet. Rate limiting and connection throttling at the network perimeter can help prevent resource exhaustion. Deploying network intrusion detection and prevention systems (IDS/IPS) configured to detect abnormal connection patterns targeting indy-node services is advisable. Organizations should also monitor connection metrics actively to identify potential abuse early. Using network segmentation to isolate indy-node servers and applying strict access control lists (ACLs) can reduce exposure. Additionally, deploying load balancers with connection management capabilities can help distribute client connections and mitigate saturation. Since the vulnerability is related to deployment configuration, regular security audits of firewall and network policies are essential. Operators should stay informed on updated guidance from Hyperledger Indy maintainers and consider implementing automated scripts or tools to enforce connection limits dynamically. Finally, organizations should prepare incident response plans specifically addressing denial of service scenarios targeting decentralized identity infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-05-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf3cdc

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/22/2025, 10:50:57 PM

Last updated: 7/31/2025, 12:03:07 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats