{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T05:24:14.197","vulnerabilities":[{"cve":{"id":"CVE-2022-39242","sourceIdentifier":"security-advisories@github.com","published":"2022-09-24T02:15:09.817","lastModified":"2024-11-21T07:17:51.587","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Frontier is an Ethereum compatibility layer for Substrate. Prior to commit d3beddc6911a559a3ecc9b3f08e153dbe37a8658, the worst case weight was always accounted as the block weight for all cases. In case of large EVM gas refunds, this can lead to block spamming attacks -- the adversary can construct blocks with transactions that have large amount of refunds or unused gases with reverts, and as a result inflate up the chain gas prices. The impact of this issue is limited in that the spamming attack would still be costly for any adversary, and it has no ability to alter any chain state. This issue has been patched in commit d3beddc6911a559a3ecc9b3f08e153dbe37a8658. There are no known workarounds."},{"lang":"es","value":"Frontier es una capa de compatibilidad con Ethereum para Substrate. En versiones anteriores al commit d3beddc6911a559a3ecc9b3f08e153dbe37a8658, el peso del peor caso siempre era contabilizado como el peso del bloque para todos los casos. En el caso de grandes reembolsos de gas de EVM, esto puede conllevar ataques de spam de bloque - el adversario puede construir bloques con transacciones que presentan gran cantidad de reembolsos o gases no usados con reversiones, y como resultado inflar los precios de gas de la cadena. El impacto de este problema es limitado en el sentido de que el ataque de spamming seguiría siendo costoso para cualquier adversario, y no presenta capacidad para alterar ningún estado de la cadena. Este problema ha sido parcheado en el commit d3beddc6911a559a3ecc9b3f08e153dbe37a8658. No se presentan mitigaciones conocidas.\n"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-682"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-682"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:parity:frontier:*:*:*:*:*:*:*:*","versionEndExcluding":"2022-09-12","matchCriteriaId":"412F953F-E85C-4125-92DB-42F71615B960"}]}]}],"references":[{"url":"https://github.com/paritytech/frontier/pull/851","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/paritytech/frontier/security/advisories/GHSA-v57h-6hmh-g2p4","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/paritytech/frontier/pull/851","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/paritytech/frontier/security/advisories/GHSA-v57h-6hmh-g2p4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}