CVE-2023-42374
📋 TL;DR
A critical vulnerability in Sui Blockchain nodes before version 1.6.3 allows remote attackers to execute arbitrary code and cause denial of service by sending specially crafted compressed scripts. This affects all Sui node operators running vulnerable versions, potentially compromising blockchain network integrity.
💻 Affected Systems
- Sui Blockchain Node
📦 What is this software?
Sui by Mystenlabs
⚠️ Risk & Real-World Impact
Worst Case
Complete node compromise leading to arbitrary code execution, data theft, network disruption, and potential chain manipulation.
Likely Case
Denial of service causing node crashes and network instability, with possible remote code execution in targeted attacks.
If Mitigated
Minimal impact if patched promptly; unpatched nodes remain vulnerable to crashes and potential compromise.
🎯 Exploit Status
Attack requires sending crafted compressed scripts to vulnerable nodes; no authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.6.3 and later
Vendor Advisory: https://github.com/MystenLabs/sui/commit/42d4ad103a21d23fecd7c0271453da41604e71e9
Restart Required: Yes
Instructions:
1. Stop Sui node service. 2. Update to Sui v1.6.3 or later using package manager or source build. 3. Restart Sui node service. 4. Verify version is 1.6.3+.
🔧 Temporary Workarounds
Network Segmentation
linuxRestrict network access to Sui nodes to trusted sources only
iptables -A INPUT -p tcp --dport <sui_port> -s <trusted_ip> -j ACCEPT
iptables -A INPUT -p tcp --dport <sui_port> -j DROP
🧯 If You Can't Patch
- Implement strict network ACLs to limit node access to trusted IPs only
- Deploy intrusion detection systems to monitor for suspicious compressed script patterns
🔍 How to Verify
Check if Vulnerable:
Check Sui node version; if below 1.6.3, system is vulnerable
Check Version:
sui --version
Verify Fix Applied:
Confirm Sui node version is 1.6.3 or higher and node operates normally
📡 Detection & Monitoring
Log Indicators:
- Node crash logs
- Memory exhaustion errors
- Unexpected decompression failures
Network Indicators:
- Unusual compressed script traffic to Sui node ports
- Spike in memory usage
SIEM Query:
source="sui.log" AND ("crash" OR "memory" OR "decompression")
🔗 References
- https://beosin.com/resources/%22memory-bomb%22-vulnerability-causes-sui-node-to-crash?lang=en-US
- https://github.com/MystenLabs/sui/commit/42d4ad103a21d23fecd7c0271453da41604e71e9
- https://medium.com/%40Beosin_com/memory-bomb-vulnerability-causes-sui-node-to-crash-7e8e3ef5057c
- https://beosin.com/resources/%22memory-bomb%22-vulnerability-causes-sui-node-to-crash?lang=en-US
- https://github.com/MystenLabs/sui/commit/42d4ad103a21d23fecd7c0271453da41604e71e9
- https://medium.com/%40Beosin_com/memory-bomb-vulnerability-causes-sui-node-to-crash-7e8e3ef5057c