CVE-2022-36058: CWE-20: Improper Input Validation in ElrondNetwork elrond-go
Elrond go is the go implementation for the Elrond Network protocol. In versions prior to 1.3.34, anyone who uses elrond-go to process blocks (historical or actual) could encounter a `MultiESDTNFTTransfer` transaction like this: `MultiESDTNFTTransfer` with a missing function name. Basic functionality like p2p messaging, storage, API requests and such are unaffected. Version 1.3.34 contains a fix for this issue. There are no known workarounds.
AI Analysis
Technical Summary
CVE-2022-36058 is a medium-severity vulnerability identified in the elrond-go software, which is the Go language implementation of the Elrond Network protocol. The vulnerability is classified under CWE-20, indicating improper input validation. Specifically, in versions of elrond-go prior to 1.3.34 (i.e., versions <= 1.3.33), the software does not correctly handle certain malformed MultiESDTNFTTransfer transactions. These transactions may be missing a required function name, which is a critical parameter for processing such transfers. When elrond-go processes blocks containing these malformed transactions—whether historical or current—it may encounter unexpected behavior due to the lack of validation on this input. Importantly, this vulnerability does not affect other core functionalities of the protocol such as peer-to-peer messaging, storage, or API requests. The issue was addressed and fixed in version 1.3.34 of elrond-go. There are no known workarounds for this vulnerability, meaning that affected users must upgrade to the patched version to mitigate the risk. No known exploits have been reported in the wild to date. The vulnerability arises from insufficient input validation, which could potentially allow malformed transaction data to disrupt normal block processing or cause errors in the node’s operation, possibly leading to denial of service or inconsistent blockchain state processing if exploited. However, the exact impact depends on how the software handles such invalid input internally, which is not detailed in the provided information.
Potential Impact
For European organizations utilizing the Elrond Network, particularly those running nodes or services based on elrond-go versions prior to 1.3.34, this vulnerability could lead to disruptions in blockchain transaction processing. This may affect blockchain validators, exchanges, wallet providers, and any enterprise integrating Elrond blockchain data into their systems. The improper input validation could cause nodes to reject blocks or transactions, potentially leading to denial of service conditions or inconsistent ledger states. While the vulnerability does not impact core network functionalities like P2P messaging or API requests, the integrity and availability of transaction processing could be compromised. This could undermine trust in blockchain operations, delay transaction finality, or cause operational downtime. Given the increasing adoption of blockchain technologies in European financial services, supply chain management, and digital identity solutions, such disruptions could have cascading effects on business operations, regulatory compliance, and customer trust. However, since no known exploits are reported and the vulnerability requires processing of malformed transactions, the immediate risk is moderate but should not be underestimated.
Mitigation Recommendations
The primary and only effective mitigation is to upgrade all instances of elrond-go to version 1.3.34 or later, where the input validation issue has been fixed. Organizations should audit their infrastructure to identify all nodes and services running vulnerable versions and prioritize patching. Additionally, implement rigorous input validation and transaction filtering at the application layer before transactions are submitted to elrond-go nodes to reduce the risk of malformed transactions reaching the node. Monitoring blockchain node logs for errors related to MultiESDTNFTTransfer transactions can help detect attempts to exploit this vulnerability. Deploying network-level controls to restrict access to blockchain nodes and ensuring that only trusted peers can submit blocks may also reduce exposure. Finally, organizations should maintain up-to-date backups of blockchain node data and configurations to enable rapid recovery in case of disruption.
Affected Countries
Germany, France, Netherlands, Switzerland, United Kingdom, Luxembourg
CVE-2022-36058: CWE-20: Improper Input Validation in ElrondNetwork elrond-go
Description
Elrond go is the go implementation for the Elrond Network protocol. In versions prior to 1.3.34, anyone who uses elrond-go to process blocks (historical or actual) could encounter a `MultiESDTNFTTransfer` transaction like this: `MultiESDTNFTTransfer` with a missing function name. Basic functionality like p2p messaging, storage, API requests and such are unaffected. Version 1.3.34 contains a fix for this issue. There are no known workarounds.
AI-Powered Analysis
Technical Analysis
CVE-2022-36058 is a medium-severity vulnerability identified in the elrond-go software, which is the Go language implementation of the Elrond Network protocol. The vulnerability is classified under CWE-20, indicating improper input validation. Specifically, in versions of elrond-go prior to 1.3.34 (i.e., versions <= 1.3.33), the software does not correctly handle certain malformed MultiESDTNFTTransfer transactions. These transactions may be missing a required function name, which is a critical parameter for processing such transfers. When elrond-go processes blocks containing these malformed transactions—whether historical or current—it may encounter unexpected behavior due to the lack of validation on this input. Importantly, this vulnerability does not affect other core functionalities of the protocol such as peer-to-peer messaging, storage, or API requests. The issue was addressed and fixed in version 1.3.34 of elrond-go. There are no known workarounds for this vulnerability, meaning that affected users must upgrade to the patched version to mitigate the risk. No known exploits have been reported in the wild to date. The vulnerability arises from insufficient input validation, which could potentially allow malformed transaction data to disrupt normal block processing or cause errors in the node’s operation, possibly leading to denial of service or inconsistent blockchain state processing if exploited. However, the exact impact depends on how the software handles such invalid input internally, which is not detailed in the provided information.
Potential Impact
For European organizations utilizing the Elrond Network, particularly those running nodes or services based on elrond-go versions prior to 1.3.34, this vulnerability could lead to disruptions in blockchain transaction processing. This may affect blockchain validators, exchanges, wallet providers, and any enterprise integrating Elrond blockchain data into their systems. The improper input validation could cause nodes to reject blocks or transactions, potentially leading to denial of service conditions or inconsistent ledger states. While the vulnerability does not impact core network functionalities like P2P messaging or API requests, the integrity and availability of transaction processing could be compromised. This could undermine trust in blockchain operations, delay transaction finality, or cause operational downtime. Given the increasing adoption of blockchain technologies in European financial services, supply chain management, and digital identity solutions, such disruptions could have cascading effects on business operations, regulatory compliance, and customer trust. However, since no known exploits are reported and the vulnerability requires processing of malformed transactions, the immediate risk is moderate but should not be underestimated.
Mitigation Recommendations
The primary and only effective mitigation is to upgrade all instances of elrond-go to version 1.3.34 or later, where the input validation issue has been fixed. Organizations should audit their infrastructure to identify all nodes and services running vulnerable versions and prioritize patching. Additionally, implement rigorous input validation and transaction filtering at the application layer before transactions are submitted to elrond-go nodes to reduce the risk of malformed transactions reaching the node. Monitoring blockchain node logs for errors related to MultiESDTNFTTransfer transactions can help detect attempts to exploit this vulnerability. Deploying network-level controls to restrict access to blockchain nodes and ensuring that only trusted peers can submit blocks may also reduce exposure. Finally, organizations should maintain up-to-date backups of blockchain node data and configurations to enable rapid recovery in case of disruption.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf68cd
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 11:42:09 PM
Last updated: 8/11/2025, 7:34:24 AM
Views: 9
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.