Skip to content

IBC-Go: Non-deterministic JSON Unmarshalling of IBC Acknowledgement can result in a chain halt

Critical severity GitHub Reviewed Published Mar 12, 2025 in cosmos/ibc-go • Updated Mar 12, 2025

Package

gomod github.com/cosmos/ibc-go (Go)

Affected versions

< 7.10.0

Patched versions

7.10.0
gomod github.com/cosmos/ibc-go/v2 (Go)
< 7.10.0
7.10.0
gomod github.com/cosmos/ibc-go/v3 (Go)
< 7.10.0
7.10.0
gomod github.com/cosmos/ibc-go/v4 (Go)
< 7.10.0
7.10.0
gomod github.com/cosmos/ibc-go/v5 (Go)
< 7.10.0
7.10.0
gomod github.com/cosmos/ibc-go/v6 (Go)
< 7.10.0
7.10.0
gomod github.com/cosmos/ibc-go/v7 (Go)
< 7.10.0
7.10.0
gomod github.com/cosmos/ibc-go/v8 (Go)
>= 8.0.0-alpha.1, < 8.7.0
8.7.0

Description

Name: ISA-2025-001: Non-deterministic JSON Unmarshalling of IBC Acknowledgement can result in a chain halt
Component: IBC-Go
Criticality: High (Considerable Impact; Likely Likelihood per ACMv1.2)
Affected versions: IBC-Go >= v7; Earlier IBC-Go versions MAY also be affected.
Affected users: Validators, Full nodes, IBC Middleware authors

Description

An issue was discovered in IBC-Go's deserialization of acknowledgements that results in non-deterministic behavior which can halt a chain. Any user that can open an IBC channel can introduce this state to the chain. The following patch is in addition to the previous patch which now extends the same protection to all applications beyond transfer.

Patches

The new IBC-Go releases below address this issue:

Workarounds

To prevent this state from being introduced to a chain, it is possible to permission Channel Opening as a workaround.

Notes on Re-Release

This is an extension of the previous patch, please update to the latest patch to get full coverage against the reported issue.

Is this state breaking?

This patch is not state breaking unless an exploit is submitted before the patch is applied across the network in which case the chain will halt just as if it was unpatched. Thus, you can safely apply this patch in a rolling manner and encourage validators to patch as soon as possible in order to prevent any chain halts (and we've already cut new versions of these for you).

Testing we have done to gain more confidence in this release

  • In addition to testing ibc-go, we also did the following:
  • Tested PFM v7 and v8 after bumping dependencies
  • Tested ibc-hooks v7 and v8 after bumping dependencies
  • Ran a patched node on Cosmos Hub Mainnet and triggered failing and successful transactions that used PFM
  • Ran a patched node on Osmosis mainnet and triggered failing and successful transactions that used ibc-hooks
    This is a more thorough process than before, so we have higher confidence.

This issue was reported to the Cosmos Bug Bounty Program by swelf19 on HackerOne on February 18, 2025. If you believe you have found a bug in the Interchain Stack or would like to contribute to the program by reporting a bug, please see https://hackerone.com/cosmos.

If you have questions about Interchain security efforts, please reach out to our official communication channel at [email protected]. For more information about the Interchain Foundation’s engagement with Amulet, and to sign up for security notification emails, please see https://github.com/interchainio/security.

A Github Security Advisory for this issue is available in the IBC-Go repository.

References

@gjermundgaraba gjermundgaraba published to cosmos/ibc-go Mar 12, 2025
Published to the GitHub Advisory Database Mar 12, 2025
Reviewed Mar 12, 2025
Last updated Mar 12, 2025

Severity

Critical

EPSS score

Weaknesses

No CWEs

CVE ID

No known CVE

GHSA ID

GHSA-4wf3-5qj9-368v

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.