{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T07:28:19.803","vulnerabilities":[{"cve":{"id":"CVE-2022-21685","sourceIdentifier":"security-advisories@github.com","published":"2022-01-14T17:15:13.333","lastModified":"2024-11-21T06:45:13.753","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Frontier is Substrate's Ethereum compatibility layer. Prior to commit number `8a93fdc6c9f4eb1d2f2a11b7ff1d12d70bf5a664`, a bug in Frontier's MODEXP precompile implementation can cause an integer underflow in certain conditions. This will cause a node crash for debug builds. For release builds (and production WebAssembly binaries), the impact is limited as it can only cause a normal EVM out-of-gas. Users who do not use MODEXP precompile in their runtime are not impacted. A patch is available in pull request #549."},{"lang":"es","value":"Frontier es la capa de compatibilidad con Ethereum de Substrate. Antes del número de commit \"8a93fdc6c9f4eb1d2f2a11b7ff1d12d70bf5a664\", un error en la implementación de precompilación MODEXP de Frontier puede causar un desbordamiento de enteros en determinadas condiciones. Esto causará un bloqueo del nodo en las versiones de depuración. Para las compilaciones de lanzamiento (y los binarios WebAssembly de producción), el impacto es limitado, ya que sólo puede causar un desbordamiento normal de EVM. Los usuarios que no usan la precompilación MODEXP en su tiempo de ejecución no están afectados. Un parche está disponible en el pull request #549"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-191"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-191"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:parity:frontier:*:*:*:*:*:*:*:*","versionEndIncluding":"2022-01-13","matchCriteriaId":"3A4B1256-AD46-4572-AAD3-0E35CA31193E"}]}]}],"references":[{"url":"https://github.com/paritytech/frontier/commit/8a93fdc6c9f4eb1d2f2a11b7ff1d12d70bf5a664","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/paritytech/frontier/pull/549","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/paritytech/frontier/security/advisories/GHSA-cjg2-2fjg-fph4","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/paritytech/frontier/commit/8a93fdc6c9f4eb1d2f2a11b7ff1d12d70bf5a664","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/paritytech/frontier/pull/549","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/paritytech/frontier/security/advisories/GHSA-cjg2-2fjg-fph4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}