XRP Under Threat! Critical Ledger Bug Feared to Have Exposed User Funds!

Published 10 hours ago2 minute read
David Isong
David Isong
XRP Under Threat! Critical Ledger Bug Feared to Have Exposed User Funds!

A severe logic flaw within the XRP Ledger (XRPL) codebase, specifically in the proposed "Batch" amendment (XLS-56), was recently discovered and narrowly averted. This critical vulnerability could have allowed malicious attackers to drain user wallets without requiring their private keys, modify the ledger state, and potentially destabilize the entire XRPL ecosystem.

The flaw was identified earlier this month by independent researcher Pranamya Keshkamat, working in conjunction with an autonomous AI security tool named Apex. Their discovery was made while the Batch amendment was still in its voting phase and had not yet been activated on the XRPL mainnet. This fortunate timing meant that no user funds were ever at risk or lost due to this particular vulnerability.

The Batch amendment was designed to enhance efficiency by allowing multiple "inner" transactions to be grouped together. These inner transactions were intentionally left unsigned to conserve processing power, with authorization delegated to the outer batch's list of signers. The critical vulnerability stemmed from a loop error in the process of calling these signers. Specifically, if the system encountered a signer for an account that did not yet exist on the ledger, and the signing key matched that new account, the validation process would immediately declare success and exit the loop early, bypassing crucial validator checks. An attacker could have exploited this with a specific sequence of batched transactions.

In response to this significant discovery, developers swiftly released the Rippled 3.1.1 reference server software. This emergency patch explicitly marks the Batch amendment as unsupported, preventing its activation. Furthermore, a comprehensive fix has been developed to address the issue, which involves removing the early-exit loop and implementing tighter authorization guards. This revised solution is currently undergoing rigorous peer review to ensure its robustness and security before any future consideration for implementation.

Recommended Articles

Loading...

You may also like...