Arbitrum found a vulnerability in Bridge to Ethereum Layer-one

Recently, a Twitter account with the title “riptide” published an short article connected to a vulnerability in the bridge involving Ethereum – Arbitrum Nitro.

Arbitrum discovered a vulnerability in Bridge to Ethereum Layer-1
Arbitrum found a vulnerability in Bridge to Ethereum Layer-one

This white hat hacker then immediately contacted the Arbitrum group, therefore resolving the aforementioned vulnerability and obtaining a bug bounty on ImmuneFi.

Consequently, this vulnerability could make it possible for hackers to steal the total volume of ETH loaded in the bridge involving Layer-one (e.g. mainnet Ethereum) and Layer-two (right here is the Arbitrum Nitro model).

This white hat hacker claimed that the initialize () perform that aids end users signal transactions and send encryption requests to the sequencer (validation unit) has encountered some vulnerabilities. The 1st two storage spaces (positions and one) of this perform are empty, which suggests that the hacker can impersonate the consumer and then send the authentication message to the Sequencer.

This initialization-connected vulnerability appeared earlier in Nomad’s sensible contract.

> See much more: Nomad cross-chain bridge breached and “soiled” with much more than $ 176 million in harm

Fortunately, this vulnerability was immediately acknowledged by the Arbitrum group and a reward of 400 ETH was sent to the aforementioned white hat hacker.

Synthetic currency 68

Maybe you are interested:

Maybe you are interested:

Exit mobile version