CVE-2022-31020: CWE-287: Improper Authentication in hyperledger indy-node
Indy Node is the server portion of a distributed ledger purpose-built for decentralized identity. In versions 1.12.4 and prior, the `pool-upgrade` request handler in Indy-Node allows an improperly authenticated attacker to remotely execute code on nodes within the network. The `pool-upgrade` request handler in Indy-Node 1.12.5 has been updated to properly authenticate pool-upgrade transactions before any processing is performed by the request handler. The transactions are further sanitized to prevent remote code execution. As a workaround, endorsers should not create DIDs for untrusted users. A vulnerable ledger should configure `auth_rules` to prevent new DIDs from being written to the ledger until the network can be upgraded.
AI Analysis
Technical Summary
CVE-2022-31020 is a security vulnerability identified in the hyperledger indy-node software, specifically affecting versions 1.12.4 and earlier. Indy-node serves as the server component of Hyperledger Indy, a distributed ledger technology designed for decentralized identity management. The vulnerability arises from improper authentication (CWE-287) in the handling of the 'pool-upgrade' request. This request handler is responsible for processing upgrade transactions within the ledger network. Due to insufficient authentication checks, an attacker can remotely submit a 'pool-upgrade' transaction without proper authorization, leading to the possibility of remote code execution (RCE) on nodes within the network. Additionally, the vulnerability involves improper input validation (CWE-20), which further facilitates exploitation by allowing maliciously crafted transactions to execute arbitrary code. The issue was addressed in version 1.12.5, where the 'pool-upgrade' request handler was updated to enforce strict authentication before processing any upgrade transactions. Furthermore, input sanitization was improved to prevent RCE. As a temporary mitigation, it is recommended that endorsers avoid creating decentralized identifiers (DIDs) for untrusted users, and vulnerable ledgers should configure 'auth_rules' to block new DID writes until the network can be patched. No known exploits have been reported in the wild, but the vulnerability poses a significant risk due to the potential for unauthorized control over ledger nodes, which are critical infrastructure components in decentralized identity ecosystems.
Potential Impact
The potential impact of this vulnerability on European organizations is considerable, especially for entities relying on Hyperledger Indy for decentralized identity solutions, such as government agencies, financial institutions, and large enterprises involved in digital identity verification and management. Exploitation could lead to unauthorized remote code execution on ledger nodes, compromising the integrity and availability of the distributed ledger. This could result in manipulation or disruption of identity data, undermining trust in digital identity systems and potentially causing cascading effects on services dependent on these identities. Confidentiality could also be at risk if attackers gain access to sensitive identity information stored or processed by the nodes. Given the critical role of decentralized identity in emerging digital services and regulatory compliance (e.g., eIDAS in the EU), disruption or compromise could have legal, operational, and reputational consequences. The medium severity rating reflects the need for authentication bypass and some technical sophistication, but the broad scope of affected nodes and the criticality of the service elevate the risk profile for European organizations using this technology.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading all Indy-node instances to version 1.12.5 or later, where the authentication and input validation issues have been resolved. Until upgrades can be applied, organizations should enforce strict 'auth_rules' configurations to prevent the creation of new DIDs by untrusted users, effectively limiting the attack surface. Network segmentation and strict access controls should be implemented to restrict who can submit 'pool-upgrade' transactions. Monitoring and logging of upgrade requests should be enhanced to detect any unauthorized or suspicious activity promptly. Additionally, organizations should conduct thorough audits of their decentralized identity infrastructure to identify any unauthorized changes or anomalies. Given the potential for remote code execution, endpoint protection and intrusion detection systems should be tuned to detect exploitation attempts. Finally, organizations should engage with their Hyperledger community and vendors to stay informed about patches, advisories, and best practices specific to Indy-node deployments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Estonia
CVE-2022-31020: CWE-287: Improper Authentication in hyperledger indy-node
Description
Indy Node is the server portion of a distributed ledger purpose-built for decentralized identity. In versions 1.12.4 and prior, the `pool-upgrade` request handler in Indy-Node allows an improperly authenticated attacker to remotely execute code on nodes within the network. The `pool-upgrade` request handler in Indy-Node 1.12.5 has been updated to properly authenticate pool-upgrade transactions before any processing is performed by the request handler. The transactions are further sanitized to prevent remote code execution. As a workaround, endorsers should not create DIDs for untrusted users. A vulnerable ledger should configure `auth_rules` to prevent new DIDs from being written to the ledger until the network can be upgraded.
AI-Powered Analysis
Technical Analysis
CVE-2022-31020 is a security vulnerability identified in the hyperledger indy-node software, specifically affecting versions 1.12.4 and earlier. Indy-node serves as the server component of Hyperledger Indy, a distributed ledger technology designed for decentralized identity management. The vulnerability arises from improper authentication (CWE-287) in the handling of the 'pool-upgrade' request. This request handler is responsible for processing upgrade transactions within the ledger network. Due to insufficient authentication checks, an attacker can remotely submit a 'pool-upgrade' transaction without proper authorization, leading to the possibility of remote code execution (RCE) on nodes within the network. Additionally, the vulnerability involves improper input validation (CWE-20), which further facilitates exploitation by allowing maliciously crafted transactions to execute arbitrary code. The issue was addressed in version 1.12.5, where the 'pool-upgrade' request handler was updated to enforce strict authentication before processing any upgrade transactions. Furthermore, input sanitization was improved to prevent RCE. As a temporary mitigation, it is recommended that endorsers avoid creating decentralized identifiers (DIDs) for untrusted users, and vulnerable ledgers should configure 'auth_rules' to block new DID writes until the network can be patched. No known exploits have been reported in the wild, but the vulnerability poses a significant risk due to the potential for unauthorized control over ledger nodes, which are critical infrastructure components in decentralized identity ecosystems.
Potential Impact
The potential impact of this vulnerability on European organizations is considerable, especially for entities relying on Hyperledger Indy for decentralized identity solutions, such as government agencies, financial institutions, and large enterprises involved in digital identity verification and management. Exploitation could lead to unauthorized remote code execution on ledger nodes, compromising the integrity and availability of the distributed ledger. This could result in manipulation or disruption of identity data, undermining trust in digital identity systems and potentially causing cascading effects on services dependent on these identities. Confidentiality could also be at risk if attackers gain access to sensitive identity information stored or processed by the nodes. Given the critical role of decentralized identity in emerging digital services and regulatory compliance (e.g., eIDAS in the EU), disruption or compromise could have legal, operational, and reputational consequences. The medium severity rating reflects the need for authentication bypass and some technical sophistication, but the broad scope of affected nodes and the criticality of the service elevate the risk profile for European organizations using this technology.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading all Indy-node instances to version 1.12.5 or later, where the authentication and input validation issues have been resolved. Until upgrades can be applied, organizations should enforce strict 'auth_rules' configurations to prevent the creation of new DIDs by untrusted users, effectively limiting the attack surface. Network segmentation and strict access controls should be implemented to restrict who can submit 'pool-upgrade' transactions. Monitoring and logging of upgrade requests should be enhanced to detect any unauthorized or suspicious activity promptly. Additionally, organizations should conduct thorough audits of their decentralized identity infrastructure to identify any unauthorized changes or anomalies. Given the potential for remote code execution, endpoint protection and intrusion detection systems should be tuned to detect exploitation attempts. Finally, organizations should engage with their Hyperledger community and vendors to stay informed about patches, advisories, and best practices specific to Indy-node deployments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3ce4
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/22/2025, 10:50:40 PM
Last updated: 7/29/2025, 2:31:08 AM
Views: 11
Related Threats
CVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50862: n/a
MediumCVE-2025-50861: n/a
HighCVE-2025-8978: Insufficient Verification of Data Authenticity in D-Link DIR-619L
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.