CVE-2021-41593
📋 TL;DR
This vulnerability in Lightning Network Daemon (lnd) allows attackers to exploit dust HTLCs (Hashed Time-Locked Contracts) to force channel closures and potentially steal funds. It affects all lnd users running vulnerable versions, particularly those with open payment channels. The issue stems from insufficient validation of small-value HTLCs.
💻 Affected Systems
- Lightning Labs lnd
📦 What is this software?
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
Lightning Network Daemon by Lightning Network Daemon Project
⚠️ Risk & Real-World Impact
Worst Case
Complete loss of funds in affected Lightning channels through forced channel closures and theft of channel balances.
Likely Case
Partial fund loss through griefing attacks where attackers force unnecessary channel closures, incurring on-chain fees and disrupting payment routing.
If Mitigated
Minimal impact with proper monitoring and updated software, though some disruption may occur during attacks.
🎯 Exploit Status
Exploitation requires understanding of Lightning Network protocols but no authentication to target nodes.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.13.3-beta and later
Vendor Advisory: https://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.md
Restart Required: Yes
Instructions:
1. Stop lnd service. 2. Backup channel state and wallet. 3. Upgrade to v0.13.3-beta or later. 4. Restart lnd service. 5. Monitor for successful operation.
🔧 Temporary Workarounds
Close vulnerable channels
allForce close all payment channels to prevent exploitation, though this incurs on-chain fees and disrupts operations.
lncli closeallchannels --force
🧯 If You Can't Patch
- Monitor channel activity closely for unusual dust HTLC patterns and force close suspicious channels immediately.
- Reduce channel sizes and limit total channel capacity to minimize potential loss.
🔍 How to Verify
Check if Vulnerable:
Check lnd version with 'lncli getinfo' or 'lnd --version'. If version is below 0.13.3-beta, system is vulnerable.
Check Version:
lncli getinfo | grep version || lnd --version
Verify Fix Applied:
After upgrade, confirm version is 0.13.3-beta or higher and monitor for normal channel operation without forced closures.
📡 Detection & Monitoring
Log Indicators:
- Unexpected channel force closures
- Multiple dust HTLC failures
- Channel balance discrepancies
Network Indicators:
- Unusual pattern of small-value HTLCs across channels
- Increased on-chain transaction volume from channel closures
SIEM Query:
lnd_logs: "force close" OR "dust HTLC" OR "channel closure"
🔗 References
- https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing
- https://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.md
- https://github.com/lightningnetwork/lnd/releases/tag/v0.13.3-beta
- https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html
- https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html
- https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.html
- https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing
- https://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.md
- https://github.com/lightningnetwork/lnd/releases/tag/v0.13.3-beta
- https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html
- https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html
- https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.html