CVE-2020-22741

7.5 HIGH

📋 TL;DR

This vulnerability in Xuperchain 3.6.0 allows attackers to recover any user's private key after obtaining a partial signature in multisignature transactions. This affects all Xuperchain users utilizing multisignature functionality, potentially compromising blockchain security and asset control.

💻 Affected Systems

Products:
  • Xuperchain
Versions: 3.6.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using multisignature functionality. Single signature accounts are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all multisignature accounts, allowing attackers to steal all assets and impersonate any user in the blockchain network.

🟠

Likely Case

Targeted theft of assets from specific multisignature accounts where attackers can obtain partial signatures through social engineering or other means.

🟢

If Mitigated

Limited impact if multisignature is disabled or if strict access controls prevent attackers from obtaining partial signatures.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires obtaining a partial signature through some means (social engineering, insider threat, etc.) before the cryptographic attack can be performed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 3.6.0

Vendor Advisory: https://github.com/xuperchain/xuperchain/issues/782

Restart Required: Yes

Instructions:

1. Upgrade Xuperchain to version 3.7.0 or later. 2. Restart all Xuperchain nodes. 3. Verify the upgrade was successful by checking the version.

🔧 Temporary Workarounds

Disable Multisignature

all

Temporarily disable all multisignature functionality until patching can be completed.

Modify configuration to disable multisignature features

Restrict Partial Signature Access

all

Implement strict access controls and monitoring for partial signature generation and storage.

🧯 If You Can't Patch

  • Implement strict monitoring and alerting for unusual multisignature activity
  • Consider migrating critical assets to single signature accounts temporarily

🔍 How to Verify

Check if Vulnerable:

Check if running Xuperchain version 3.6.0 and if multisignature functionality is enabled.

Check Version:

xchain-cli version

Verify Fix Applied:

Verify Xuperchain version is 3.7.0 or later and multisignature functionality works without the vulnerability.

📡 Detection & Monitoring

Log Indicators:

  • Unusual multisignature transaction patterns
  • Multiple failed signature attempts
  • Unexpected private key generation events

Network Indicators:

  • Unusual network traffic to signature generation endpoints
  • Suspicious API calls to multisignature functions

SIEM Query:

source="xuperchain" AND (event="multisignature" OR event="partial_signature") AND status="unusual"

🔗 References

📤 Share & Export