Impact
A remote unauthenticated attacker can crash a Zebra node by sending a specially crafted V5 transaction that passes initial deserialization but fails during transaction ID calculation, forcing a panic in the transaction processing logic. This results in a denial of service, disrupting the node’s availability for a participant in the Zcash network.
Affected Systems
The vulnerability affects Zcash Foundation’s Zebra node and Zebra-chain software versions prior to zebrad 4.3.0 and zebra-chain 6.0.1. Only these older releases are impacted; newer releases incorporate the fix.
Risk and Exploitability
The CVSS score of 9.2 indicates high severity, while the EPSS score of less than 1% suggests a low probability of widespread exploitation. The issue is not listed in the CISA KEV catalog. The attack vector is P2P reachable, meaning a remote attacker can trigger the crash by sending the crafted transaction over the network, without any authentication.
OpenCVE Enrichment
Github GHSA