Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-31020: CWE-287: Improper Authentication in hyperledger indy-node

0
Medium
Published: Tue Sep 06 2022 (09/06/2022, 16:30:19 UTC)
Source: CVE
Vendor/Project: hyperledger
Product: indy-node

Description

Indy Node is the server portion of a distributed ledger purpose-built for decentralized identity. In versions 1.12.4 and prior, the `pool-upgrade` request handler in Indy-Node allows an improperly authenticated attacker to remotely execute code on nodes within the network. The `pool-upgrade` request handler in Indy-Node 1.12.5 has been updated to properly authenticate pool-upgrade transactions before any processing is performed by the request handler. The transactions are further sanitized to prevent remote code execution. As a workaround, endorsers should not create DIDs for untrusted users. A vulnerable ledger should configure `auth_rules` to prevent new DIDs from being written to the ledger until the network can be upgraded.

AI-Powered Analysis

AILast updated: 06/22/2025, 22:50:40 UTC

Technical Analysis

CVE-2022-31020 is a security vulnerability identified in the hyperledger indy-node software, specifically affecting versions 1.12.4 and earlier. Indy-node serves as the server component of Hyperledger Indy, a distributed ledger technology designed for decentralized identity management. The vulnerability arises from improper authentication (CWE-287) in the handling of the 'pool-upgrade' request. This request handler is responsible for processing upgrade transactions within the ledger network. Due to insufficient authentication checks, an attacker can remotely submit a 'pool-upgrade' transaction without proper authorization, leading to the possibility of remote code execution (RCE) on nodes within the network. Additionally, the vulnerability involves improper input validation (CWE-20), which further facilitates exploitation by allowing maliciously crafted transactions to execute arbitrary code. The issue was addressed in version 1.12.5, where the 'pool-upgrade' request handler was updated to enforce strict authentication before processing any upgrade transactions. Furthermore, input sanitization was improved to prevent RCE. As a temporary mitigation, it is recommended that endorsers avoid creating decentralized identifiers (DIDs) for untrusted users, and vulnerable ledgers should configure 'auth_rules' to block new DID writes until the network can be patched. No known exploits have been reported in the wild, but the vulnerability poses a significant risk due to the potential for unauthorized control over ledger nodes, which are critical infrastructure components in decentralized identity ecosystems.

Potential Impact

The potential impact of this vulnerability on European organizations is considerable, especially for entities relying on Hyperledger Indy for decentralized identity solutions, such as government agencies, financial institutions, and large enterprises involved in digital identity verification and management. Exploitation could lead to unauthorized remote code execution on ledger nodes, compromising the integrity and availability of the distributed ledger. This could result in manipulation or disruption of identity data, undermining trust in digital identity systems and potentially causing cascading effects on services dependent on these identities. Confidentiality could also be at risk if attackers gain access to sensitive identity information stored or processed by the nodes. Given the critical role of decentralized identity in emerging digital services and regulatory compliance (e.g., eIDAS in the EU), disruption or compromise could have legal, operational, and reputational consequences. The medium severity rating reflects the need for authentication bypass and some technical sophistication, but the broad scope of affected nodes and the criticality of the service elevate the risk profile for European organizations using this technology.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading all Indy-node instances to version 1.12.5 or later, where the authentication and input validation issues have been resolved. Until upgrades can be applied, organizations should enforce strict 'auth_rules' configurations to prevent the creation of new DIDs by untrusted users, effectively limiting the attack surface. Network segmentation and strict access controls should be implemented to restrict who can submit 'pool-upgrade' transactions. Monitoring and logging of upgrade requests should be enhanced to detect any unauthorized or suspicious activity promptly. Additionally, organizations should conduct thorough audits of their decentralized identity infrastructure to identify any unauthorized changes or anomalies. Given the potential for remote code execution, endpoint protection and intrusion detection systems should be tuned to detect exploitation attempts. Finally, organizations should engage with their Hyperledger community and vendors to stay informed about patches, advisories, and best practices specific to Indy-node deployments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-05-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf3ce4

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/22/2025, 10:50:40 PM

Last updated: 2/7/2026, 9:48:04 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats