Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:z.cash:zcash:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA26BB19-6E16-4B93-BADC-1859FE3AE39C", "versionEndIncluding": "2.0.1", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Zcash, before the Sapling network upgrade (2018-10-28), had a counterfeiting vulnerability. A key-generation process, during evaluation of polynomials related to a to-be-proven statement, produced certain bypass elements. Availability of these elements allowed a cheating prover to bypass a consistency check, and consequently transform the proof of one statement into an ostensibly valid proof of a different statement, thereby breaking the soundness of the proof system. This misled the original Sprout zk-SNARK verifier into accepting the correctness of a transaction."}, {"lang": "es", "value": "Zcash, antes de la actualizaci\u00f3n de la red Sapling (28/10/2018), ten\u00eda una vulnerabilidad de falsificaci\u00f3n. Un proceso generador de claves durante la evaluaci\u00f3n de polinomios relacionados con una instrucci\u00f3n por confirmar produc\u00eda ciertos elementos de omisi\u00f3n. La disponibilidad de estos elementos permit\u00eda que un \"prover\" falso omitiese una comprobaci\u00f3n de consistencia y, en consecuencia, transformase la prueba de una instrucci\u00f3n en una prueba ostensiblemente v\u00e1lida de una instrucci\u00f3n diferente, quebrantando as\u00ed la seguridad del sistema de pruebas. Esto hac\u00eda que el verificador Sprout zk-SNARK original aceptase que una transacci\u00f3n fuese correcta."}], "id": "CVE-2019-7167", "lastModified": "2024-11-21T04:47:42.300", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-03-27T02:29:00.250", "references": [{"source": "cve@mitre.org", "tags": ["Press/Media Coverage", "Third Party Advisory"], "url": "http://fortune.com/2019/02/05/zcash-vulnerability-cryptocurrency/"}, {"source": "cve@mitre.org", "url": "https://github.com/JinBean/CVE-Extension"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://z.cash/blog/zcash-counterfeiting-vulnerability-successfully-remediated/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Press/Media Coverage", "Third Party Advisory"], "url": "http://fortune.com/2019/02/05/zcash-vulnerability-cryptocurrency/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/JinBean/CVE-Extension"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://z.cash/blog/zcash-counterfeiting-vulnerability-successfully-remediated/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-754"}], "source": "nvd@nist.gov", "type": "Primary"}]}