#39679 [BC-Critical] bypass certificate signing validation by double counting signatures
#39679 [BC-Critical] Bypass certificate signing validation by double counting signatures due to ignored suffixes
Description
Impact
Root Cause
Attack Flow
Staking
Kicking a node
Deep Dive
Suggested Fix
Severity
Message to the project
Proof of Concept
POC
Previous#39103 [BC-Insight] Unchecked data size in "getStakeTxBlobFromEVMTx()" can use lots of CPU resourcesNext#39678 [BC-Critical] Bypass certificate signing validation by double counting signatures due to capitalization
Was this helpful?