First published: Fri Nov 12 2021(Updated: )
OpenZeppelin Contracts is a library for smart contract development. In affected versions upgradeable contracts using `UUPSUpgradeable` may be vulnerable to an attack affecting uninitialized implementation contracts. A fix is included in version 4.3.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. For users unable to upgrade; initialize implementation contracts using `UUPSUpgradeable` by invoking the initializer function (usually called `initialize`). An example is provided [in the forum](https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301).
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenZeppelin Contracts | >=4.1.0<4.3.2 |
https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41264 is a vulnerability in OpenZeppelin Contracts library that affects upgradeable contracts using UUPSUpgradeable and allows for attacks on uninitialized implementation contracts.
CVE-2021-41264 has a severity rating of 9.8 (critical).
Versions between 4.1.0 and 4.3.2 of OpenZeppelin Contracts are affected by CVE-2021-41264.
To fix CVE-2021-41264, upgrade to version 4.3.2 of @openzeppelin/contracts.
More information about CVE-2021-41264 can be found in the OpenZeppelin forum and GitHub repositories.