Skip to main content

CVE-2024-21669: CWE-347: Improper Verification of Cryptographic Signature in hyperledger aries-cloudagent-python

Critical
VulnerabilityCVE-2024-21669cvecve-2024-21669cwe-347
Published: Thu Jan 11 2024 (01/11/2024, 05:40:30 UTC)
Source: CVE Database V5
Vendor/Project: hyperledger
Product: aries-cloudagent-python

Description

Hyperledger Aries Cloud Agent Python (ACA-Py) is a foundation for building decentralized identity applications and services running in non-mobile environments. When verifying W3C Format Verifiable Credentials using JSON-LD with Linked Data Proofs (LDP-VCs), the result of verifying the presentation `document.proof` was not factored into the final `verified` value (`true`/`false`) on the presentation record. The flaw enables holders of W3C Format Verifiable Credentials using JSON-LD with Linked Data Proofs (LDPs) to present incorrectly constructed proofs, and allows malicious verifiers to save and replay a presentation from such holders as their own. This vulnerability has been present since version 0.7.0 and fixed in version 0.10.5.

AI-Powered Analysis

AILast updated: 07/03/2025, 22:43:48 UTC

Technical Analysis

CVE-2024-21669 is a critical vulnerability in Hyperledger Aries Cloud Agent Python (ACA-Py), a foundational framework used to build decentralized identity applications and services in non-mobile environments. The vulnerability stems from improper verification of cryptographic signatures (CWE-347) when handling W3C Format Verifiable Credentials using JSON-LD with Linked Data Proofs (LDP-VCs). Specifically, during the verification process of a presentation's proof (`document.proof`), the verification result was not properly incorporated into the final `verified` boolean value on the presentation record. This flaw allows holders of such verifiable credentials to present incorrectly constructed proofs without detection. Moreover, it enables malicious verifiers to save and replay a presentation from credential holders as if it were their own, effectively bypassing intended cryptographic protections. The vulnerability affects ACA-Py versions from 0.7.0 up to but not including 0.10.5, and also versions from 0.11.0rc1 up to but not including 0.11.0. The issue was publicly disclosed on January 11, 2024, and carries a CVSS v3.1 score of 9.9, indicating a critical severity level. The attack vector is network-based with low attack complexity, requiring low privileges but no user interaction, and impacts confidentiality, integrity, and availability with a scope change. Although no known exploits are reported in the wild yet, the vulnerability poses a severe risk to the integrity of decentralized identity verification processes, potentially undermining trust in systems relying on ACA-Py for credential verification.

Potential Impact

For European organizations leveraging decentralized identity frameworks built on Hyperledger Aries Cloud Agent Python, this vulnerability can have significant repercussions. The ability for malicious actors to present forged or replayed credentials threatens the confidentiality and integrity of identity verification processes, potentially enabling unauthorized access to sensitive systems, services, or data. This undermines trust in digital identity infrastructures, which are increasingly critical in sectors such as finance, healthcare, government services, and supply chain management across Europe. The vulnerability could facilitate identity fraud, unauthorized transactions, or data breaches, leading to regulatory non-compliance under GDPR and other data protection laws. Additionally, the potential for replay attacks may disrupt service availability or cause denial of service conditions if systems are overwhelmed with invalid presentations. Given the growing adoption of decentralized identity solutions in Europe, the impact extends beyond individual organizations to the broader ecosystem relying on verifiable credentials for secure interactions.

Mitigation Recommendations

European organizations should urgently upgrade all deployments of Hyperledger Aries Cloud Agent Python to version 0.10.5 or later, or to 0.11.0 or later if using release candidates, to incorporate the official fix for this vulnerability. Beyond patching, organizations should implement additional verification layers such as anomaly detection on credential presentations to identify unusual patterns indicative of replay attacks. Employing strict session management and nonce usage can help prevent replay of previously captured presentations. Organizations should also audit their credential issuance and verification logs to detect any suspicious activity. Where possible, integrating hardware security modules (HSMs) or trusted execution environments (TEEs) for cryptographic operations can enhance signature verification robustness. Finally, organizations should review and update their incident response plans to include scenarios involving compromised verifiable credentials and conduct staff training on the risks associated with decentralized identity systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2023-12-29T16:10:20.368Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0a31182aa0cae27f6f2d

Added to database: 6/3/2025, 2:44:01 PM

Last enriched: 7/3/2025, 10:43:48 PM

Last updated: 7/28/2025, 6:30:14 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats