Cross-Chain Bridge Exploit via Improper Signature Verification

11/28/2023

A critical vulnerability was discovered in a popular cross-chain bridge allowing attackers to forge transaction signatures and withdraw unauthorized funds.

Overview

A critical vulnerability was identified in a major cross-chain bridge protocol that allowed attackers to forge transaction signatures due to improper signature verification mechanisms, resulting in an $18 million exploit.

Technical Details

The vulnerability stemmed from the bridge's validator node implementation that failed to properly verify the v parameter in ECDSA signatures. This allowed attackers to craft malicious signature objects that would pass verification checks despite not being authentic.
Solidity
1// Vulnerable code example
2function verifySignature(bytes32 messageHash, uint8 v, bytes32 r, bytes32 s, address expectedSigner) internal pure returns (bool) {
3    address signer = ecrecover(messageHash, v, r, s);
4    
5    // Vulnerability: does not check for signature malleability
6    // Missing validation for v parameter (should be 27 or 28)
7    
8    return signer == expectedSigner;
9}
test123

Vulnerability Details

Category
Bridge
Chain
BNB
Affected Systems
Cross-Chain Bridges
Discovered By
Independent Security Researcher
Contract/Token
Alkimiya_io
Financial Loss
$18M
Exploit Status
Previously Exploited

Stay Protected

Get notified about new vulnerabilities

Subscribe to our security alerts to receive timely notifications about new vulnerabilities and exploits.

Subscribe to Alerts