CVE-2025-65951

8.7 HIGH

📋 TL;DR

This vulnerability in the Entropy Derby betting engine allows bettors to bypass the time-delay encryption system by pre-computing VDF outputs. The betting operator can then decrypt bets immediately instead of waiting for the intended sequential delay. This affects any system running vulnerable versions of Entropy Derby.

💻 Affected Systems

Products:
  • Entropy Derby (Inside Track betting engine)
Versions: All versions prior to commit 2d38d2f
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the VDF-based timelock encryption feature for betting.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Betting operators could decrypt all bets immediately, enabling front-running, manipulation of betting outcomes, and complete compromise of the fair betting system.

🟠

Likely Case

Malicious bettors could gain unfair advantage by timing bets perfectly, while operators could manipulate results for financial gain.

🟢

If Mitigated

With proper patching, the VDF system enforces the intended time delay, maintaining fair betting and preventing immediate decryption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of VDF systems and access to place bets. The advisory provides technical details but no public exploit code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit 2d38d2f or later

Vendor Advisory: https://github.com/mescuwa/entropy-derby/security/advisories/GHSA-pm54-f847-w4mh

Restart Required: Yes

Instructions:

1. Pull latest code from repository. 2. Apply commit 2d38d2f. 3. Rebuild and redeploy the betting engine. 4. Restart all betting services.

🔧 Temporary Workarounds

Disable VDF timelock feature

all

Temporarily disable the vulnerable VDF-based encryption system until patching is complete.

# Configuration setting depends on implementation
# Set use_vdf_timelock = false in config

🧯 If You Can't Patch

  • Disable betting functionality entirely until patched.
  • Implement additional audit logging for all bet decryption events.

🔍 How to Verify

Check if Vulnerable:

Check if your Entropy Derby version includes commit 2d38d2f. If not, you are vulnerable.

Check Version:

git log --oneline | grep 2d38d2f

Verify Fix Applied:

Verify that commit 2d38d2f is present in your codebase and that the VDF system now properly enforces sequential delays.

📡 Detection & Monitoring

Log Indicators:

  • Multiple bets decrypted in rapid succession
  • VDF proof verification without corresponding evaluation time

Network Indicators:

  • Unusual timing patterns in bet submission and processing

SIEM Query:

search 'bet decryption' AND 'time < expected_delay'

🔗 References

📤 Share & Export