Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24783: CWE-682: Incorrect Calculation in script3 soroban-fixed-point-math

0
High
VulnerabilityCVE-2026-24783cvecve-2026-24783cwe-682
Published: Tue Jan 27 2026 (01/27/2026, 22:04:18 UTC)
Source: CVE Database V5
Vendor/Project: script3
Product: soroban-fixed-point-math

Description

CVE-2026-24783 is a high-severity vulnerability in the soroban-fixed-point-math library versions 1. 3. 0 and 1. 4. 0, affecting fixed-point math calculations in Soroban smart contracts. The mulDiv(x, y, z) function incorrectly handles cases where both the intermediate product (x * y) and divisor (z) are negative, causing rounding errors in the wrong direction. This impacts signed FixedPoint implementations including i64, i128, and I256 types. The flaw can lead to incorrect integrity of calculations within smart contracts, potentially causing financial or logical errors. No authentication or user interaction is required to exploit this, and the vulnerability is remotely exploitable. Patched versions 1.

AI-Powered Analysis

AILast updated: 01/27/2026, 22:35:14 UTC

Technical Analysis

The vulnerability CVE-2026-24783 resides in the soroban-fixed-point-math library, specifically in the mulDiv(x, y, z) function used for fixed-point arithmetic in Soroban smart contracts. In versions 1.3.0 and 1.4.0, the function incorrectly assumes that if the intermediate product x * y is negative, the final result must also be negative, disregarding the sign of the divisor z. This logical error leads to incorrect rounding direction when both the product and divisor are negative, affecting the accuracy of fixed-point division operations. The functions fixed_div_floor and fixed_div_ceil are particularly vulnerable because they often use non-constant divisors, increasing the likelihood of triggering the bug. This issue affects all signed FixedPoint and SorobanFixedPoint implementations, including 64-bit, 128-bit, and 256-bit integer types. The vulnerability compromises the integrity of mathematical operations within smart contracts, potentially causing erroneous financial calculations or contract logic failures. The flaw is exploitable remotely without authentication or user interaction, increasing its risk profile. Although no known exploits are currently in the wild, the availability of patched versions 1.3.1 and 1.4.1 underscores the importance of updating. No workarounds are available, making patching the only effective mitigation.

Potential Impact

For European organizations leveraging Soroban smart contracts, this vulnerability poses a significant risk to the integrity of financial and operational computations. Incorrect rounding in fixed-point math can lead to subtle but critical errors in contract execution, potentially resulting in financial losses, incorrect asset transfers, or logic failures in decentralized applications. Given the automated and trustless nature of smart contracts, such errors can be exploited or cause cascading failures without immediate detection. The lack of authentication or user interaction requirements means attackers can remotely trigger the flaw, increasing exposure. Organizations in finance, supply chain, and blockchain-based services are particularly vulnerable. The impact extends to reputational damage and regulatory scrutiny if financial discrepancies arise from flawed contract calculations. The absence of workarounds further elevates the urgency for patching to maintain contract integrity and trustworthiness.

Mitigation Recommendations

European organizations should immediately upgrade soroban-fixed-point-math to versions 1.3.1 or 1.4.1 where the vulnerability is patched. Conduct a thorough audit of all Soroban smart contracts using affected library versions to identify and remediate any contracts relying on vulnerable fixed-point math operations. Implement rigorous testing and validation of contract outputs, especially those involving signed fixed-point calculations with negative operands. Integrate continuous monitoring for anomalous contract behavior that could indicate exploitation or calculation errors. Where possible, isolate or sandbox contracts using the vulnerable library to limit potential damage until patched. Educate developers on the importance of using updated libraries and verifying mathematical correctness in smart contracts. Engage with blockchain security firms for specialized code reviews and penetration testing focused on fixed-point arithmetic vulnerabilities. Maintain an inventory of all blockchain components to ensure no outdated versions remain in production environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-26T21:06:47.869Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69793a494623b1157c4b1c6f

Added to database: 1/27/2026, 10:20:57 PM

Last enriched: 1/27/2026, 10:35:14 PM

Last updated: 1/27/2026, 11:31:54 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats