CVE-2026-3192

5.6 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to bypass authentication in Chia Blockchain's RPC interface by manipulating the _authenticate function. It affects systems running Chia Blockchain 2.1.0 with RPC enabled. Attackers could potentially execute unauthorized RPC commands on vulnerable instances.

💻 Affected Systems

Products:
  • Chia Blockchain
Versions: 2.1.0
Operating Systems: all
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with RPC interface enabled and accessible. The vulnerability is in the default authentication mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Chia node allowing unauthorized RPC commands, potentially including wallet operations, blockchain manipulation, or system command execution.

🟠

Likely Case

Unauthorized access to RPC functions, potentially allowing attackers to query sensitive information or perform limited administrative actions.

🟢

If Mitigated

Minimal impact if RPC interface is properly firewalled or authentication is enforced through additional layers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploit code is publicly available on GitHub. The vendor considers this 'by design' and has not provided a fix.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: none

Vendor Advisory: none

Restart Required: No

Instructions:

No official patch available. Vendor rejected the vulnerability report stating 'This is by design. The user is responsible for host security'.

🔧 Temporary Workarounds

Disable RPC Interface

all

Completely disable the RPC interface if not required

Edit chia configuration to disable RPC server

Network Restriction

all

Restrict RPC access to trusted IP addresses only

Configure firewall rules to allow only specific IPs to port 8555

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to restrict RPC access
  • Monitor RPC logs for unauthorized access attempts and implement intrusion detection

🔍 How to Verify

Check if Vulnerable:

Check if running Chia Blockchain 2.1.0 with RPC enabled. Test authentication bypass using the public PoC.

Check Version:

chia version

Verify Fix Applied:

Verify RPC interface is disabled or properly firewalled. Test authentication requirements for RPC endpoints.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful RPC calls
  • RPC requests from unexpected IP addresses

Network Indicators:

  • Unauthenticated RPC requests to port 8555
  • RPC traffic patterns inconsistent with normal usage

SIEM Query:

source="chia.log" AND "RPC" AND "authenticate" AND ("failed" OR "bypass")

🔗 References

📤 Share & Export