Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-44797: n/a in n/a

0
Critical
VulnerabilityCVE-2022-44797cvecve-2022-44797
Published: Mon Nov 07 2022 (11/07/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

btcd before 0.23.2, as used in Lightning Labs lnd before 0.15.2-beta and other Bitcoin-related products, mishandles witness size checking.

AI-Powered Analysis

AILast updated: 07/02/2025, 01:40:12 UTC

Technical Analysis

CVE-2022-44797 is a critical vulnerability affecting btcd versions prior to 0.23.2, which is a full-node Bitcoin implementation written in Go. This vulnerability also impacts Lightning Labs' lnd before version 0.15.2-beta and potentially other Bitcoin-related products that rely on btcd. The core issue involves improper handling of witness size checking during transaction validation. Witness data is part of the Segregated Witness (SegWit) upgrade to Bitcoin, which separates signature data from transaction data to improve scalability and fix transaction malleability. Mishandling witness size checks can allow malformed or malicious transactions to be accepted or processed incorrectly, potentially leading to severe consequences such as transaction malleability, double-spending, or denial of service. The vulnerability has a CVSS 3.1 score of 9.8, indicating critical severity, with an attack vector that is network-based, requiring no privileges or user interaction, and impacting confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the potential for exploitation is high given the widespread use of btcd and Lightning Network implementations in Bitcoin infrastructure. This vulnerability could undermine trust in Bitcoin transactions and disrupt payment channels that rely on Lightning Network nodes, affecting the broader cryptocurrency ecosystem.

Potential Impact

For European organizations, especially financial institutions, cryptocurrency exchanges, payment processors, and blockchain service providers, this vulnerability poses a significant risk. Exploitation could lead to transaction malleability or double-spending attacks, undermining the integrity of financial transactions and potentially causing financial losses. Disruption of Lightning Network nodes could degrade payment channel reliability, impacting services that depend on fast and low-cost Bitcoin transactions. Given the increasing adoption of Bitcoin and Lightning Network in Europe for both retail and institutional use, this vulnerability could affect operational continuity and customer trust. Additionally, regulatory compliance concerns may arise if organizations fail to adequately secure their cryptocurrency infrastructure. The potential impact extends to any European entity running affected versions of btcd or Lightning Labs lnd, including startups, fintech companies, and blockchain infrastructure providers.

Mitigation Recommendations

Organizations should immediately audit their Bitcoin infrastructure to identify any instances of btcd prior to version 0.23.2 and Lightning Labs lnd versions before 0.15.2-beta. Upgrading to the patched versions is critical to remediate the vulnerability. In environments where immediate upgrade is not feasible, implementing network-level controls to restrict access to Bitcoin nodes and Lightning Network services can reduce exposure. Monitoring transaction validation logs for anomalies related to witness data size can help detect attempted exploitation. Additionally, organizations should review their incident response plans to include scenarios involving blockchain transaction manipulation or denial of service. Engaging with vendors and open-source communities to stay informed about patches and advisories is essential. Finally, conducting regular security assessments of cryptocurrency infrastructure and applying defense-in-depth strategies will help mitigate risks from similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-07T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9839c4522896dcbec8c8

Added to database: 5/21/2025, 9:09:13 AM

Last enriched: 7/2/2025, 1:40:12 AM

Last updated: 2/7/2026, 1:19:57 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats