First published: Mon Nov 02 2020(Updated: )
An issue was discovered in IPFS (aka go-ipfs) 0.4.23. An attacker can generate ephemeral identities (Sybils) and leverage the IPFS connection management reputation system to poison other nodes' routing tables, eclipsing the nodes that are the target of the attack from the rest of the network. Later versions, in particular go-ipfs 0.7, mitigate this.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Protocol Ipfs | =0.4.23 | |
go/github.com/ipfs/go-ipfs | <0.7.0 | 0.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10937 is classified as a medium severity vulnerability.
To mitigate CVE-2020-10937, update IPFS to version 0.7.0 or later.
CVE-2020-10937 affects IPFS version 0.4.23.
CVE-2020-10937 allows attackers to perform routing table poisoning and eclipse attacks on IPFS nodes.
The primary impact of CVE-2020-10937 is the disruption of node communication within the IPFS network.