CVE-2021-41591
📋 TL;DR
CVE-2021-41591 is a vulnerability in ACINQ Eclair Lightning Network implementation that allows attackers to exploit dust HTLC (Hashed TimeLock Contract) exposure to cause loss of funds. This affects Lightning Network node operators running vulnerable Eclair versions, potentially allowing malicious peers to force channel closures and steal funds.
💻 Affected Systems
- ACINQ Eclair
📦 What is this software?
Eclair by Acinq
⚠️ Risk & Real-World Impact
Worst Case
Complete loss of funds in vulnerable Lightning Network channels through forced channel closures and theft of channel balances.
Likely Case
Targeted attacks against vulnerable nodes resulting in partial or complete channel fund loss, particularly affecting nodes with many open channels.
If Mitigated
No fund loss with proper patching; unpatched nodes remain vulnerable to sophisticated attackers.
🎯 Exploit Status
Exploitation requires establishing Lightning Network channels with vulnerable nodes. The 'good griefing' attack technique is documented in Lightning Network research papers and mailing lists.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.6.3 and later
Vendor Advisory: https://github.com/ACINQ/eclair/pull/1985
Restart Required: Yes
Instructions:
1. Stop Eclair service. 2. Backup configuration and data. 3. Update to Eclair 0.6.3 or later. 4. Restart Eclair service. 5. Monitor for successful operation.
🔧 Temporary Workarounds
Close vulnerable channels
allManually close all existing Lightning Network channels to prevent exploitation through established connections.
eclair-cli close --channelId=<channel_id>
eclair-cli channels
🧯 If You Can't Patch
- Disable all Lightning Network functionality and operate as Bitcoin-only node
- Close all existing channels and do not open new channels until patched
🔍 How to Verify
Check if Vulnerable:
Check Eclair version: if version is below 0.6.3, the system is vulnerable.
Check Version:
eclair-cli getinfo | grep version
Verify Fix Applied:
Confirm Eclair version is 0.6.3 or higher and monitor for successful channel operations without forced closures.
📡 Detection & Monitoring
Log Indicators:
- Unexpected channel force-closures
- Multiple dust HTLC failures
- Channel balance discrepancies
Network Indicators:
- Unusual pattern of small HTLC payments
- Rapid channel opening/closing from same peer
SIEM Query:
source="eclair.log" AND ("force-close" OR "dust HTLC" OR "channel failure")
🔗 References
- https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing
- https://github.com/ACINQ/eclair/pull/1985
- https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html
- https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html
- https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing
- https://github.com/ACINQ/eclair/pull/1985
- https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html
- https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html