CVE-2022-36025: CWE-681: Incorrect Conversion between Numeric Types in hyperledger besu
Besu is a Java-based Ethereum client. In versions newer than 22.1.3 and prior to 22.7.1, Besu is subject to an Incorrect Conversion between Numeric Types. An error in 32 bit signed and unsigned types in the calculation of available gas in the CALL operations (including DELEGATECALL) results in incorrect gas being passed into called contracts and incorrect gas being returned after call execution. Where the amount of gas makes a difference in the success or failure, or if the gas is a negative 64 bit value, the execution will result in a different state root than expected, resulting in a consensus failure in networks with multiple EVM implementations. In networks with a single EVM implementation this can be used to execute with significantly more gas than then transaction requested, possibly exceeding gas limitations. This issue is patched in version 22.7.1. As a workaround, reverting to version 22.1.3 or earlier will prevent incorrect execution.
AI Analysis
Technical Summary
CVE-2022-36025 is a vulnerability identified in Hyperledger Besu, a Java-based Ethereum client widely used for enterprise blockchain implementations. The issue arises from an incorrect conversion between numeric types during the calculation of available gas in Ethereum Virtual Machine (EVM) CALL operations, including DELEGATECALL. Specifically, the error involves the handling of 32-bit signed and unsigned integers, which leads to incorrect gas values being passed to called contracts and incorrect gas amounts being returned after execution. This miscalculation can cause the execution to deviate from expected behavior in two significant ways. First, in blockchain networks that utilize multiple EVM implementations, the discrepancy in gas calculations can result in different state roots across nodes, causing consensus failures and potentially destabilizing the network. Second, in networks with a single EVM implementation, the flaw can be exploited to execute transactions with significantly more gas than originally requested, potentially bypassing gas limits and leading to resource exhaustion or denial of service. The vulnerability affects Besu versions newer than 22.1.3 and prior to 22.7.1 and was patched in version 22.7.1. As a temporary mitigation, reverting to version 22.1.3 or earlier prevents the incorrect gas calculation. No known exploits have been reported in the wild to date. The root cause is linked to CWE-681 (Incorrect Conversion between Numeric Types) and CWE-196 (Unsigned to Signed Conversion Error), highlighting a fundamental programming error in type handling within the gas calculation logic.
Potential Impact
For European organizations utilizing Hyperledger Besu in their blockchain infrastructure, this vulnerability poses several risks. The most critical impact is the potential for consensus failures in permissioned or consortium blockchain networks that rely on multiple EVM implementations, which are common in enterprise and cross-organizational settings. Such failures can disrupt transaction finality, reduce trust in the blockchain ledger, and cause operational downtime. Additionally, the ability to execute transactions with more gas than intended could lead to denial-of-service conditions by exhausting node resources, impacting availability and performance. This is particularly concerning for financial institutions, supply chain consortia, and public sector entities in Europe that depend on blockchain for critical operations. While no active exploitation has been observed, the vulnerability undermines the integrity and reliability of blockchain transactions, potentially affecting confidentiality indirectly if transaction processing is disrupted or manipulated. Given the increasing adoption of blockchain technologies in Europe, especially in countries with strong fintech and industrial blockchain initiatives, the threat could have broad operational and reputational consequences.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability beyond generic patching advice. First, upgrade all Hyperledger Besu nodes to version 22.7.1 or later, where the issue is resolved. If immediate upgrading is not feasible, revert to version 22.1.3 or earlier as a temporary measure to prevent incorrect gas calculations. Conduct thorough audits of blockchain network configurations to identify if multiple EVM implementations are in use, as these environments are at higher risk of consensus failures. Implement monitoring tools to detect anomalies in gas usage and transaction execution times that could indicate exploitation attempts or consensus issues. Additionally, review smart contract logic for dependencies on precise gas calculations and consider adding safeguards or fallback mechanisms to handle unexpected gas values. For consortium networks, coordinate with all participants to ensure synchronized upgrades and consistent client versions to avoid network partitioning. Finally, incorporate this vulnerability into incident response and risk management frameworks, emphasizing blockchain-specific threat scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland, Luxembourg, Estonia
CVE-2022-36025: CWE-681: Incorrect Conversion between Numeric Types in hyperledger besu
Description
Besu is a Java-based Ethereum client. In versions newer than 22.1.3 and prior to 22.7.1, Besu is subject to an Incorrect Conversion between Numeric Types. An error in 32 bit signed and unsigned types in the calculation of available gas in the CALL operations (including DELEGATECALL) results in incorrect gas being passed into called contracts and incorrect gas being returned after call execution. Where the amount of gas makes a difference in the success or failure, or if the gas is a negative 64 bit value, the execution will result in a different state root than expected, resulting in a consensus failure in networks with multiple EVM implementations. In networks with a single EVM implementation this can be used to execute with significantly more gas than then transaction requested, possibly exceeding gas limitations. This issue is patched in version 22.7.1. As a workaround, reverting to version 22.1.3 or earlier will prevent incorrect execution.
AI-Powered Analysis
Technical Analysis
CVE-2022-36025 is a vulnerability identified in Hyperledger Besu, a Java-based Ethereum client widely used for enterprise blockchain implementations. The issue arises from an incorrect conversion between numeric types during the calculation of available gas in Ethereum Virtual Machine (EVM) CALL operations, including DELEGATECALL. Specifically, the error involves the handling of 32-bit signed and unsigned integers, which leads to incorrect gas values being passed to called contracts and incorrect gas amounts being returned after execution. This miscalculation can cause the execution to deviate from expected behavior in two significant ways. First, in blockchain networks that utilize multiple EVM implementations, the discrepancy in gas calculations can result in different state roots across nodes, causing consensus failures and potentially destabilizing the network. Second, in networks with a single EVM implementation, the flaw can be exploited to execute transactions with significantly more gas than originally requested, potentially bypassing gas limits and leading to resource exhaustion or denial of service. The vulnerability affects Besu versions newer than 22.1.3 and prior to 22.7.1 and was patched in version 22.7.1. As a temporary mitigation, reverting to version 22.1.3 or earlier prevents the incorrect gas calculation. No known exploits have been reported in the wild to date. The root cause is linked to CWE-681 (Incorrect Conversion between Numeric Types) and CWE-196 (Unsigned to Signed Conversion Error), highlighting a fundamental programming error in type handling within the gas calculation logic.
Potential Impact
For European organizations utilizing Hyperledger Besu in their blockchain infrastructure, this vulnerability poses several risks. The most critical impact is the potential for consensus failures in permissioned or consortium blockchain networks that rely on multiple EVM implementations, which are common in enterprise and cross-organizational settings. Such failures can disrupt transaction finality, reduce trust in the blockchain ledger, and cause operational downtime. Additionally, the ability to execute transactions with more gas than intended could lead to denial-of-service conditions by exhausting node resources, impacting availability and performance. This is particularly concerning for financial institutions, supply chain consortia, and public sector entities in Europe that depend on blockchain for critical operations. While no active exploitation has been observed, the vulnerability undermines the integrity and reliability of blockchain transactions, potentially affecting confidentiality indirectly if transaction processing is disrupted or manipulated. Given the increasing adoption of blockchain technologies in Europe, especially in countries with strong fintech and industrial blockchain initiatives, the threat could have broad operational and reputational consequences.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability beyond generic patching advice. First, upgrade all Hyperledger Besu nodes to version 22.7.1 or later, where the issue is resolved. If immediate upgrading is not feasible, revert to version 22.1.3 or earlier as a temporary measure to prevent incorrect gas calculations. Conduct thorough audits of blockchain network configurations to identify if multiple EVM implementations are in use, as these environments are at higher risk of consensus failures. Implement monitoring tools to detect anomalies in gas usage and transaction execution times that could indicate exploitation attempts or consensus issues. Additionally, review smart contract logic for dependencies on precise gas calculations and consider adding safeguards or fallback mechanisms to handle unexpected gas values. For consortium networks, coordinate with all participants to ensure synchronized upgrades and consistent client versions to avoid network partitioning. Finally, incorporate this vulnerability into incident response and risk management frameworks, emphasizing blockchain-specific threat scenarios.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf43a6
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 5:20:43 PM
Last updated: 2/4/2026, 10:24:25 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25584: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in InternationalColorConsortium iccDEV
HighCVE-2026-25583: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in InternationalColorConsortium iccDEV
HighCVE-2026-25582: CWE-122: Heap-based Buffer Overflow in InternationalColorConsortium iccDEV
HighCVE-2026-25541: CWE-680: Integer Overflow to Buffer Overflow in tokio-rs bytes
MediumCVE-2026-1892: Improper Authorization in WeKan
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.