CVE-2021-3006
📋 TL;DR
The breed function in Seal Finance's smart contract lacks access control, allowing unauthorized users to manipulate token prices. This affects users of the Seal Finance platform who interact with the vulnerable smart contract, potentially leading to financial losses.
💻 Affected Systems
- Seal Finance smart contract
📦 What is this software?
Seal Finance by Seal Finance Project
⚠️ Risk & Real-World Impact
Worst Case
Complete price manipulation leading to significant financial losses for users, potential collapse of the token's value, and loss of trust in the platform.
Likely Case
Price manipulation resulting in financial losses for users, arbitrage opportunities for attackers, and reputational damage to Seal Finance.
If Mitigated
No impact if proper access controls are implemented to restrict breed function to authorized users only.
🎯 Exploit Status
Exploited in the wild in December 2020 and January 2021. The exploit requires basic understanding of smart contract interaction but no special privileges.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not applicable - smart contracts are immutable
Vendor Advisory: https://blocksecteam.medium.com/security-incident-on-seal-finance-fa79c27a1c3b
Restart Required: No
Instructions:
Cannot patch existing contract. Must deploy new contract with proper access controls and migrate users.
🔧 Temporary Workarounds
Contract migration
allDeploy new smart contract with proper access controls and migrate all users and funds from vulnerable contract
Not applicable - requires smart contract development and deployment
🧯 If You Can't Patch
- Monitor contract for suspicious breed function calls and alert on unusual activity
- Implement off-chain validation and monitoring of price movements to detect manipulation
🔍 How to Verify
Check if Vulnerable:
Check if breed function in contract at 0x33c2da7fd5b125e629b3950f3c38d7f721d7b30d lacks access control modifiers like onlyOwner or similar restrictions
Check Version:
Not applicable - check contract address and code on Etherscan
Verify Fix Applied:
Verify new contract has proper access controls on breed function and old contract is deprecated
📡 Detection & Monitoring
Log Indicators:
- Unusual frequency of breed function calls
- Breed function calls from unauthorized addresses
Network Indicators:
- Suspicious transactions to contract address
- Unusual price fluctuations in token
SIEM Query:
Not applicable - monitor blockchain transactions via Etherscan API or similar
🔗 References
- https://blocksecteam.medium.com/security-incident-on-seal-finance-fa79c27a1c3b
- https://etherscan.io/address/0x33c2da7fd5b125e629b3950f3c38d7f721d7b30d
- https://blocksecteam.medium.com/security-incident-on-seal-finance-fa79c27a1c3b
- https://etherscan.io/address/0x33c2da7fd5b125e629b3950f3c38d7f721d7b30d