XRP Ledger Bug Exposed Major Security Risk to User Funds

Published 1 month ago2 minute read
David Isong
David Isong
XRP Ledger Bug Exposed Major Security Risk to User Funds

A critical logic flaw in the XRP Ledger (XRPL) codebase, specifically within the proposed "Batch" amendment (XLS-56), was recently identified and narrowly avoided before it could cause damage.

The vulnerability had the potential to allow attackers to drain user wallets without access to private keys, alter the ledger state, and destabilize the XRPL ecosystem.

Fortunately, the flaw was discovered while the amendment was still in its voting phase and had not been activated on the mainnet, ensuring no user funds were ever at risk.

The Batch amendment was intended to improve efficiency by grouping multiple "inner" transactions under a single outer batch, leaving the inner transactions unsigned to conserve processing power.

Source: Google

The vulnerability arose from a loop error in the signer validation process: if a signer belonged to an account not yet on the ledger and the signing key matched that new account, the system would prematurely declare validation success and exit the loop.

Bypassing critical checks, malicious actors could have exploited this sequence to manipulate the ledger.

In response, developers released the Rippled 3.1.1 reference server software, marking the Batch amendment as unsupported to prevent activation.

A comprehensive fix, which removes the early-exit loop and strengthens authorization controls, is now in place and undergoing peer review.

This ensures that the XRPL can safely consider implementing the amendment in the future without compromising security.

Loading...
Loading...
Loading...

You may also like...