CVE-2021-37491
📋 TL;DR
This vulnerability in Dogecoin Core allows attackers to view sensitive wallet information through the CWallet::CreateTransaction() function. It affects Dogecoin Core 1.14.3 and earlier versions. Attackers could potentially access private wallet data that should remain confidential.
💻 Affected Systems
- Dogecoin Core
📦 What is this software?
Dogecoin by Dogecoin
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain access to sensitive wallet information including private keys or transaction details, potentially leading to theft of cryptocurrency funds.
Likely Case
Information disclosure of wallet metadata or transaction details that could be used for targeted attacks or privacy violations.
If Mitigated
Limited information exposure with no direct fund loss if proper wallet security practices are followed.
🎯 Exploit Status
Exploitation requires access to the wallet functionality, likely through local or remote API access
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Dogecoin Core 1.14.4 or later
Vendor Advisory: https://github.com/dogecoin/dogecoin/issues/2279
Restart Required: Yes
Instructions:
1. Backup wallet.dat file
2. Stop Dogecoin Core
3. Download and install Dogecoin Core 1.14.4 or later
4. Restart Dogecoin Core
5. Verify wallet functionality
🔧 Temporary Workarounds
Disable wallet functionality
allRun Dogecoin Core without wallet functionality using -disablewallet flag
dogecoind -disablewallet
Use external wallet
allUse external wallet software instead of built-in Dogecoin Core wallet
🧯 If You Can't Patch
- Restrict access to Dogecoin Core RPC interface
- Monitor for unusual wallet activity or access attempts
🔍 How to Verify
Check if Vulnerable:
Check Dogecoin Core version: dogecoin-cli getnetworkinfo | grep version
Check Version:
dogecoin-cli getnetworkinfo | grep version
Verify Fix Applied:
Verify version is 1.14.4 or later and check wallet functionality
📡 Detection & Monitoring
Log Indicators:
- Unusual wallet access patterns
- Multiple failed transaction attempts
- Unexpected RPC calls to wallet functions
Network Indicators:
- Unusual RPC traffic to wallet port
- Multiple connections from suspicious IPs
SIEM Query:
source="dogecoin.log" AND ("CreateTransaction" OR "wallet access")
🔗 References
- http://dogecoin.com
- https://github.com/VPRLab/BlkVulnReport/blob/main/NDSS23_BlockScope.pdf
- https://github.com/bitcoin/bitcoin/commit/2fb9c1e6681370478e24a19172ed6d78d95d50d3
- https://github.com/dogecoin/dogecoin/blob/master/src/wallet/wallet.cpp#L2628-L2640
- https://github.com/dogecoin/dogecoin/issues/2279
- http://dogecoin.com
- https://github.com/VPRLab/BlkVulnReport/blob/main/NDSS23_BlockScope.pdf
- https://github.com/bitcoin/bitcoin/commit/2fb9c1e6681370478e24a19172ed6d78d95d50d3
- https://github.com/dogecoin/dogecoin/blob/master/src/wallet/wallet.cpp#L2628-L2640
- https://github.com/dogecoin/dogecoin/issues/2279