Skip to main content

CVE-2022-35916: CWE-669: Incorrect Resource Transfer Between Spheres in OpenZeppelin openzeppelin-contracts

Medium
Published: Mon Aug 01 2022 (08/01/2022, 21:00:30 UTC)
Source: CVE
Vendor/Project: OpenZeppelin
Product: openzeppelin-contracts

Description

OpenZeppelin Contracts is a library for secure smart contract development. Contracts using the cross chain utilities for Arbitrum L2, `CrossChainEnabledArbitrumL2` or `LibArbitrumL2`, will classify direct interactions of externally owned accounts (EOAs) as cross chain calls, even though they are not started on L1. This issue has been patched in v4.7.2. Users are advised to upgrade. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/23/2025, 00:36:36 UTC

Technical Analysis

CVE-2022-35916 is a vulnerability identified in the OpenZeppelin Contracts library, specifically affecting versions from 4.6.0 up to but not including 4.7.2. OpenZeppelin Contracts is a widely used library for developing secure smart contracts on blockchain platforms. This vulnerability pertains to the cross-chain utilities designed for Arbitrum Layer 2 (L2) solutions, namely the `CrossChainEnabledArbitrumL2` and `LibArbitrumL2` modules. The issue arises because these modules incorrectly classify direct interactions from externally owned accounts (EOAs) as cross-chain calls, even when such interactions are not initiated on Layer 1 (L1). This misclassification leads to an incorrect resource transfer between security domains or 'spheres,' as described by CWE-669, which can cause unintended behavior in contract execution and potentially allow unauthorized or unexpected contract interactions. The vulnerability has been addressed and patched in version 4.7.2 of the OpenZeppelin Contracts library. No known workarounds exist, so upgrading to the patched version is the recommended remediation. There are no known exploits in the wild at this time, but the nature of the vulnerability could allow attackers to exploit the incorrect classification to bypass intended security checks or cross-chain communication protocols, potentially impacting the integrity and expected operation of smart contracts relying on these utilities.

Potential Impact

For European organizations utilizing blockchain technologies, particularly those deploying smart contracts on Arbitrum L2 networks using OpenZeppelin Contracts versions between 4.6.0 and 4.7.2, this vulnerability poses a risk to the integrity and trustworthiness of their decentralized applications (dApps). Exploitation could lead to unauthorized contract interactions that bypass security assumptions about cross-chain calls, potentially resulting in financial losses, unauthorized asset transfers, or disruption of contract logic. Given the increasing adoption of blockchain in sectors such as finance, supply chain, and digital identity within Europe, the vulnerability could undermine operational reliability and regulatory compliance, especially under stringent EU data and financial regulations. While no active exploits are reported, the potential for misuse exists, particularly in high-value or sensitive smart contract deployments. The vulnerability could also affect interoperability and trust in cross-chain operations, which are critical for multi-chain strategies common in European blockchain initiatives.

Mitigation Recommendations

The primary and only effective mitigation is to upgrade all affected OpenZeppelin Contracts libraries to version 4.7.2 or later, where the vulnerability has been patched. Organizations should conduct a comprehensive inventory of their smart contract deployments to identify any usage of the `CrossChainEnabledArbitrumL2` or `LibArbitrumL2` modules within the vulnerable version range. Additionally, thorough testing should be performed post-upgrade to ensure that contract functionality remains intact and that no unintended side effects occur. Since no workarounds exist, organizations should also monitor their blockchain transaction logs for unusual cross-chain call patterns that could indicate attempted exploitation. For future deployments, it is advisable to implement strict code review and dependency management practices to promptly incorporate security patches from trusted libraries like OpenZeppelin. Finally, engaging with blockchain security auditors to assess the impact of this vulnerability on custom contract logic is recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf3a19

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 12:36:36 AM

Last updated: 8/7/2025, 10:53:55 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats