Impact
The vulnerability resides in the _authenticate function of rpc_server_base.py within Chia Blockchain’s RPC Credential Handler. An attacker can manipulate input to bypass authentication checks, gaining unauthorized access to the node’s RPC interface. This enables the attacker to issue remote commands, read or modify configuration, and potentially control the node, thereby compromising confidentiality, integrity, and availability of data managed by the blockchain system. The weakness aligns with CWE-287 and CWE-306.
Affected Systems
Chia Blockchain 2.1.0 released by Chia. No other versions listed; the issue was identified in this specific release only.
Risk and Exploitability
The CVSS score of 6.3 denotes a moderate risk, while the EPSS score of less than 1% indicates a low probability of exploitation at this time. The vulnerability can be exploited remotely, but the attack requires high complexity and is difficult to carry out, as noted by the vendor. The issue is not yet listed in the CISA KEV catalog. Attackers would need to reach the RPC port, manipulate the _authenticate call, and rely on the absence of proper credential checks, which opens the system to unauthorized actions.
OpenCVE Enrichment