The team behind Lightning Network has released extensive details on the vulnerabilities that were discovered in the cryptocurrency protocol and its software implementations.
Attackers could have exploited these vulnerabilities to cause DoS and to disrupt crypto transactions by intercepting “smart contracts” made between two parties.
Lightning Network is a payment protocol that runs on top of blockchain-based cryptocurrencies like Bitcoin, Ethreum, etc.
Its main selling point is the speed of blockchain transactions.
Lightning’s website touts the protocol with phrases, “Lightning-fast blockchain payments without worrying about block confirmation times. Payment speed measured in milliseconds to seconds.”
Earlier this month, Conner Fromknecht, Head of Cryptographic Engineering at Lightning Labs had published a partial disclosure related to the vulnerabilities on Linux Foundation’s mailing list.
“We are writing to let the Lightning community know about the existence of vulnerabilities that affect lnd versions 0.10.x and below,” said Fromknecht.
This happened on October 9th, when Lightning team’s focus was mainly on prompting the users to upgrade to non-vulnerable versions of the products.
“The circumstances surrounding the discovery resulted in a compressed disclosure timeline compared to our usual timeframes. We will be publishing more details about this in the coming weeks along with a comprehensive bug bounty program,” Fromknecht had further written.
Also Read: How Bank Disclosure Of Customer Information Work For Security
This week both vulnerabilities impacting the Lightning Network cryptocurrency protocol and its software implementations have been disclosed in full detail.
The vulnerabilities were spotted as early as April 3rd, 2020 by Antoine Riard, a Bitcoin Core and Rust-Lightning contributor at Chaincode Labs.
On discovery, Riard informed both the Lightning Network (LND) team and developers behind its c-lightning and Eclair implementations.
In fact, given Lightning’s growing adoption rate and the fact money was at stake, Riard agreed to wait for six months before publicly disclosing the vulnerabilities discussed below.
Riard further shared with BleepingComputer:
“They are serious [vulnerabilities] because LN nodes channel connections are open, you can freely stake funds with any well-known nodes and thus steal from them.”
“LN nodes are hot wallets. If it would have been exploited in the wild, the impact would have been direct fund loss for victims (at least for the high-s one [CVE-2020-26895]).”
Riard additionally told BleepingComputer, “The codebase is open source and the protocol runs publicly thus patching the vulnerability overtly would have [allowed funds to be stolen] during the deployment. That is the reason patches were covert. Fixes were bundled with other changes.”
Also Read: Data Protection Framework: Practical Guidance For Businesses
Both vulnerabilities were patched in versions 0.11.0 and above of lnd, the open-source implementation of Lightning Network.
“While we have no reason to believe these vulnerabilities have been exploited in the wild, we strongly urge the community to upgrade to lnd 0.11.0 or above ASAP,” the October 9th advisory had stated.
In addition to Riard’s disclosures linked above, the Lighning Network development team has also released separate advisories for CVE-2020-26895 and CVE-2020-26896.
Update, 21-Oct-2020: Added quotes provided by Antoine Riard.