CVE-2022-35916: CWE-669: Incorrect Resource Transfer Between Spheres in OpenZeppelin openzeppelin-contracts
OpenZeppelin Contracts is a library for secure smart contract development. Contracts using the cross chain utilities for Arbitrum L2, `CrossChainEnabledArbitrumL2` or `LibArbitrumL2`, will classify direct interactions of externally owned accounts (EOAs) as cross chain calls, even though they are not started on L1. This issue has been patched in v4.7.2. Users are advised to upgrade. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-35916 is a vulnerability identified in the OpenZeppelin Contracts library, specifically affecting versions from 4.6.0 up to but not including 4.7.2. OpenZeppelin Contracts is a widely used library for developing secure smart contracts on blockchain platforms. This vulnerability pertains to the cross-chain utilities designed for Arbitrum Layer 2 (L2) solutions, namely the `CrossChainEnabledArbitrumL2` and `LibArbitrumL2` modules. The issue arises because these modules incorrectly classify direct interactions from externally owned accounts (EOAs) as cross-chain calls, even when such interactions are not initiated on Layer 1 (L1). This misclassification leads to an incorrect resource transfer between security domains or 'spheres,' as described by CWE-669, which can cause unintended behavior in contract execution and potentially allow unauthorized or unexpected contract interactions. The vulnerability has been addressed and patched in version 4.7.2 of the OpenZeppelin Contracts library. No known workarounds exist, so upgrading to the patched version is the recommended remediation. There are no known exploits in the wild at this time, but the nature of the vulnerability could allow attackers to exploit the incorrect classification to bypass intended security checks or cross-chain communication protocols, potentially impacting the integrity and expected operation of smart contracts relying on these utilities.
Potential Impact
For European organizations utilizing blockchain technologies, particularly those deploying smart contracts on Arbitrum L2 networks using OpenZeppelin Contracts versions between 4.6.0 and 4.7.2, this vulnerability poses a risk to the integrity and trustworthiness of their decentralized applications (dApps). Exploitation could lead to unauthorized contract interactions that bypass security assumptions about cross-chain calls, potentially resulting in financial losses, unauthorized asset transfers, or disruption of contract logic. Given the increasing adoption of blockchain in sectors such as finance, supply chain, and digital identity within Europe, the vulnerability could undermine operational reliability and regulatory compliance, especially under stringent EU data and financial regulations. While no active exploits are reported, the potential for misuse exists, particularly in high-value or sensitive smart contract deployments. The vulnerability could also affect interoperability and trust in cross-chain operations, which are critical for multi-chain strategies common in European blockchain initiatives.
Mitigation Recommendations
The primary and only effective mitigation is to upgrade all affected OpenZeppelin Contracts libraries to version 4.7.2 or later, where the vulnerability has been patched. Organizations should conduct a comprehensive inventory of their smart contract deployments to identify any usage of the `CrossChainEnabledArbitrumL2` or `LibArbitrumL2` modules within the vulnerable version range. Additionally, thorough testing should be performed post-upgrade to ensure that contract functionality remains intact and that no unintended side effects occur. Since no workarounds exist, organizations should also monitor their blockchain transaction logs for unusual cross-chain call patterns that could indicate attempted exploitation. For future deployments, it is advisable to implement strict code review and dependency management practices to promptly incorporate security patches from trusted libraries like OpenZeppelin. Finally, engaging with blockchain security auditors to assess the impact of this vulnerability on custom contract logic is recommended.
Affected Countries
Germany, France, Netherlands, Switzerland, United Kingdom, Sweden, Estonia
CVE-2022-35916: CWE-669: Incorrect Resource Transfer Between Spheres in OpenZeppelin openzeppelin-contracts
Description
OpenZeppelin Contracts is a library for secure smart contract development. Contracts using the cross chain utilities for Arbitrum L2, `CrossChainEnabledArbitrumL2` or `LibArbitrumL2`, will classify direct interactions of externally owned accounts (EOAs) as cross chain calls, even though they are not started on L1. This issue has been patched in v4.7.2. Users are advised to upgrade. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-35916 is a vulnerability identified in the OpenZeppelin Contracts library, specifically affecting versions from 4.6.0 up to but not including 4.7.2. OpenZeppelin Contracts is a widely used library for developing secure smart contracts on blockchain platforms. This vulnerability pertains to the cross-chain utilities designed for Arbitrum Layer 2 (L2) solutions, namely the `CrossChainEnabledArbitrumL2` and `LibArbitrumL2` modules. The issue arises because these modules incorrectly classify direct interactions from externally owned accounts (EOAs) as cross-chain calls, even when such interactions are not initiated on Layer 1 (L1). This misclassification leads to an incorrect resource transfer between security domains or 'spheres,' as described by CWE-669, which can cause unintended behavior in contract execution and potentially allow unauthorized or unexpected contract interactions. The vulnerability has been addressed and patched in version 4.7.2 of the OpenZeppelin Contracts library. No known workarounds exist, so upgrading to the patched version is the recommended remediation. There are no known exploits in the wild at this time, but the nature of the vulnerability could allow attackers to exploit the incorrect classification to bypass intended security checks or cross-chain communication protocols, potentially impacting the integrity and expected operation of smart contracts relying on these utilities.
Potential Impact
For European organizations utilizing blockchain technologies, particularly those deploying smart contracts on Arbitrum L2 networks using OpenZeppelin Contracts versions between 4.6.0 and 4.7.2, this vulnerability poses a risk to the integrity and trustworthiness of their decentralized applications (dApps). Exploitation could lead to unauthorized contract interactions that bypass security assumptions about cross-chain calls, potentially resulting in financial losses, unauthorized asset transfers, or disruption of contract logic. Given the increasing adoption of blockchain in sectors such as finance, supply chain, and digital identity within Europe, the vulnerability could undermine operational reliability and regulatory compliance, especially under stringent EU data and financial regulations. While no active exploits are reported, the potential for misuse exists, particularly in high-value or sensitive smart contract deployments. The vulnerability could also affect interoperability and trust in cross-chain operations, which are critical for multi-chain strategies common in European blockchain initiatives.
Mitigation Recommendations
The primary and only effective mitigation is to upgrade all affected OpenZeppelin Contracts libraries to version 4.7.2 or later, where the vulnerability has been patched. Organizations should conduct a comprehensive inventory of their smart contract deployments to identify any usage of the `CrossChainEnabledArbitrumL2` or `LibArbitrumL2` modules within the vulnerable version range. Additionally, thorough testing should be performed post-upgrade to ensure that contract functionality remains intact and that no unintended side effects occur. Since no workarounds exist, organizations should also monitor their blockchain transaction logs for unusual cross-chain call patterns that could indicate attempted exploitation. For future deployments, it is advisable to implement strict code review and dependency management practices to promptly incorporate security patches from trusted libraries like OpenZeppelin. Finally, engaging with blockchain security auditors to assess the impact of this vulnerability on custom contract logic is recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3a19
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/23/2025, 12:36:36 AM
Last updated: 8/7/2025, 10:53:55 PM
Views: 14
Related Threats
CVE-2025-38738: CWE-266: Incorrect Privilege Assignment in Dell SupportAssist for Home PCs
MediumCVE-2025-36612: CWE-266: Incorrect Privilege Assignment in Dell SupportAssist for Business PCs
MediumCVE-2025-9041: CWE-1287: Improper Validation of Specified Type of Input in Rockwell Automation FLEX 5000 I/O
HighCVE-2025-43983: n/a
CriticalCVE-2025-9042: CWE-1287: Improper Validation of Specified Type of Input in Rockwell Automation FLEX 5000 I/O
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.