CVE-2022-31153: CWE-664: Improper Control of a Resource Through its Lifetime in OpenZeppelin cairo-contracts
OpenZeppelin Contracts for Cairo is a library for contract development written in Cairo for StarkNet, a decentralized ZK Rollup. Version 0.2.0 is vulnerable to an error that renders account contracts unusable on live networks. This issue affects all accounts (vanilla and ethereum flavors) in the v0.2.0 release of OpenZeppelin Contracts for Cairo, which are not whitelisted on StarkNet mainnet. Only goerli deployments of v0.2.0 accounts are affected. This faulty behavior is not observed in StarkNet's testing framework. This bug has been patched in v0.2.1.
AI Analysis
Technical Summary
CVE-2022-31153 is a medium-severity vulnerability identified in version 0.2.0 of OpenZeppelin's cairo-contracts library, which is used for developing smart contracts in Cairo language on the StarkNet platform, a decentralized zero-knowledge (ZK) rollup. The vulnerability is categorized under CWE-664, indicating improper control of a resource through its lifetime. Specifically, this flaw causes account contracts—both vanilla and Ethereum-flavored—deployed with version 0.2.0 to become unusable on live networks, notably on the Goerli testnet. The issue arises because the contracts do not handle resource lifecycle management correctly, leading to faulty behavior that prevents normal contract operation. Importantly, this bug does not manifest within StarkNet's testing framework, which may have delayed its detection. The vulnerability affects only non-whitelisted accounts on the StarkNet mainnet and Goerli deployments using the vulnerable version. The problem has been addressed and patched in version 0.2.1 of the cairo-contracts library. There are no known exploits in the wild, and no authentication or user interaction is required to trigger the issue once the vulnerable contract is deployed. The impact is primarily on the availability and usability of the affected smart contracts, rendering them non-functional and potentially disrupting decentralized applications relying on these accounts.
Potential Impact
For European organizations leveraging StarkNet and OpenZeppelin's cairo-contracts for decentralized application development or blockchain-based services, this vulnerability could lead to significant operational disruptions. Affected contracts may become unusable, causing service outages or loss of functionality in blockchain applications, particularly those deployed on testnets like Goerli or on mainnet accounts not whitelisted. This can impact financial transactions, identity management, or other critical blockchain services, undermining trust and reliability. Although no known exploits exist, the inability to control contract resources properly could lead to denial of service conditions or require costly redeployments and migrations to patched contract versions. Given the growing adoption of blockchain technologies in Europe, especially in fintech hubs and innovation centers, this vulnerability poses a risk to continuity and integrity of blockchain-based services if not promptly addressed.
Mitigation Recommendations
European organizations should immediately audit their deployments of OpenZeppelin cairo-contracts, specifically checking for version 0.2.0 usage. Any contracts deployed with this version should be considered at risk and replaced or upgraded to version 0.2.1, which contains the patch. It is critical to verify whether accounts are whitelisted on StarkNet mainnet, as non-whitelisted accounts are affected. Organizations should implement continuous monitoring of smart contract versions and integrate automated dependency management tools to prevent usage of vulnerable library versions. Additionally, testing environments should be enhanced to simulate live network conditions more accurately, as the vulnerability was not detected in the existing testing framework. For ongoing deployments, consider implementing fallback mechanisms or contract upgrade patterns to mitigate potential downtime. Finally, maintain close communication with OpenZeppelin and StarkNet communities for updates and advisories.
Affected Countries
Germany, France, Netherlands, Switzerland, United Kingdom, Sweden, Estonia
CVE-2022-31153: CWE-664: Improper Control of a Resource Through its Lifetime in OpenZeppelin cairo-contracts
Description
OpenZeppelin Contracts for Cairo is a library for contract development written in Cairo for StarkNet, a decentralized ZK Rollup. Version 0.2.0 is vulnerable to an error that renders account contracts unusable on live networks. This issue affects all accounts (vanilla and ethereum flavors) in the v0.2.0 release of OpenZeppelin Contracts for Cairo, which are not whitelisted on StarkNet mainnet. Only goerli deployments of v0.2.0 accounts are affected. This faulty behavior is not observed in StarkNet's testing framework. This bug has been patched in v0.2.1.
AI-Powered Analysis
Technical Analysis
CVE-2022-31153 is a medium-severity vulnerability identified in version 0.2.0 of OpenZeppelin's cairo-contracts library, which is used for developing smart contracts in Cairo language on the StarkNet platform, a decentralized zero-knowledge (ZK) rollup. The vulnerability is categorized under CWE-664, indicating improper control of a resource through its lifetime. Specifically, this flaw causes account contracts—both vanilla and Ethereum-flavored—deployed with version 0.2.0 to become unusable on live networks, notably on the Goerli testnet. The issue arises because the contracts do not handle resource lifecycle management correctly, leading to faulty behavior that prevents normal contract operation. Importantly, this bug does not manifest within StarkNet's testing framework, which may have delayed its detection. The vulnerability affects only non-whitelisted accounts on the StarkNet mainnet and Goerli deployments using the vulnerable version. The problem has been addressed and patched in version 0.2.1 of the cairo-contracts library. There are no known exploits in the wild, and no authentication or user interaction is required to trigger the issue once the vulnerable contract is deployed. The impact is primarily on the availability and usability of the affected smart contracts, rendering them non-functional and potentially disrupting decentralized applications relying on these accounts.
Potential Impact
For European organizations leveraging StarkNet and OpenZeppelin's cairo-contracts for decentralized application development or blockchain-based services, this vulnerability could lead to significant operational disruptions. Affected contracts may become unusable, causing service outages or loss of functionality in blockchain applications, particularly those deployed on testnets like Goerli or on mainnet accounts not whitelisted. This can impact financial transactions, identity management, or other critical blockchain services, undermining trust and reliability. Although no known exploits exist, the inability to control contract resources properly could lead to denial of service conditions or require costly redeployments and migrations to patched contract versions. Given the growing adoption of blockchain technologies in Europe, especially in fintech hubs and innovation centers, this vulnerability poses a risk to continuity and integrity of blockchain-based services if not promptly addressed.
Mitigation Recommendations
European organizations should immediately audit their deployments of OpenZeppelin cairo-contracts, specifically checking for version 0.2.0 usage. Any contracts deployed with this version should be considered at risk and replaced or upgraded to version 0.2.1, which contains the patch. It is critical to verify whether accounts are whitelisted on StarkNet mainnet, as non-whitelisted accounts are affected. Organizations should implement continuous monitoring of smart contract versions and integrate automated dependency management tools to prevent usage of vulnerable library versions. Additionally, testing environments should be enhanced to simulate live network conditions more accurately, as the vulnerability was not detected in the existing testing framework. For ongoing deployments, consider implementing fallback mechanisms or contract upgrade patterns to mitigate potential downtime. Finally, maintain close communication with OpenZeppelin and StarkNet communities for updates and advisories.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6713
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/22/2025, 12:12:01 AM
Last updated: 8/12/2025, 3:08:51 AM
Views: 16
Related Threats
CVE-2025-40770: CWE-300: Channel Accessible by Non-Endpoint in Siemens SINEC Traffic Analyzer
HighCVE-2025-40769: CWE-1164: Irrelevant Code in Siemens SINEC Traffic Analyzer
HighCVE-2025-40768: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Siemens SINEC Traffic Analyzer
HighCVE-2025-40767: CWE-250: Execution with Unnecessary Privileges in Siemens SINEC Traffic Analyzer
HighCVE-2025-40766: CWE-400: Uncontrolled Resource Consumption in Siemens SINEC Traffic Analyzer
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.