Market Cap: $3.4287T 0.100%
Volume(24h): $103.407B 2.020%
  • Market Cap: $3.4287T 0.100%
  • Volume(24h): $103.407B 2.020%
  • Fear & Greed Index:
  • Market Cap: $3.4287T 0.100%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$108151.325753 USD

-1.17%

ethereum
ethereum

$2536.264983 USD

-0.71%

tether
tether

$0.999888 USD

-0.04%

xrp
xrp

$2.287752 USD

-2.21%

bnb
bnb

$672.422952 USD

0.24%

solana
solana

$172.377461 USD

-2.21%

usd-coin
usd-coin

$0.999425 USD

-0.04%

dogecoin
dogecoin

$0.223223 USD

-1.12%

cardano
cardano

$0.752236 USD

-0.82%

tron
tron

$0.273923 USD

0.90%

hyperliquid
hyperliquid

$36.508489 USD

-5.92%

sui
sui

$3.454262 USD

-4.16%

chainlink
chainlink

$15.359004 USD

-1.70%

avalanche
avalanche

$22.806216 USD

-2.18%

stellar
stellar

$0.284009 USD

-1.05%

Cryptocurrency News Articles

Besu's BN254 Vulnerability: Subgroup Check Flaw Exposes Security Risks

May 26, 2025 at 09:31 am

A critical vulnerability in Besu's Ethereum client related to subgroup checks on BN254 curve has been addressed. This flaw could have potentially compromised cryptographic security.

Besu's BN254 Vulnerability: Subgroup Check Flaw Exposes Security Risks

A critical vulnerability in Besu, an Ethereum execution client, has been addressed. This flaw, which involved an improper subgroup check on the BN254 curve, could have had broader implications for cryptographic security in the Ethereum ecosystem.

As explained in an analysis by the Ethereum Foundation, the issue arose due to a misplaced subgroup membership check in elliptic curve operations. This flaw, present in version 25.2.2 of Besu, had the potential to disrupt the consensus mechanism by allowing an attacker to manipulate cryptographic computations.

At the heart of this vulnerability lies the BN254 curve, also known as alt_bn128. This curve, the sole pairing curve supported by the Ethereum Virtual Machine (EVM) prior to EIP-2537, is used for cryptographic functions within Ethereum. Notably, it forms the basis for precompiled contracts defined under EIP-196 and EIP-197, enabling efficient computation on the curve.

A common security concern in elliptic curve cryptography is the invalid curve attack, which occurs when a point does not lie on the correct curve. This is especially relevant for non-prime order curves like BN254 used in pairing-based cryptography, where ensuring a point belongs to the correct subgroup is crucial. Failure to do so can open doors for attackers to interfere with cryptographic operations.

In Besu's case, the vulnerability arose because the subgroup membership check was performed before verifying if the point was on the curve. This sequence error could allow a point that is within the correct subgroup but off the curve to slip through security checks.

To validate a point P, both the curve and subgroup membership need to be confirmed. A point P is on the curve if it satisfies the equation y² = x³ + 486662 x + 1. To check subgroup membership, you multiply the point P by the subgroup's prime order. If the result is the identity element, then the point is in the subgroup.

However, in Besu's implementation, the order of these checks was reversed, which could have allowed an attacker to create a point that is not on the curve but is in the correct subgroup. This could then be used to maliciously interfere with cryptographic operations.

The issue has now been addressed by the Besu team, with a fix being deployed in version 25.3.0 of the client software. The correction involves ensuring that both checks are performed in the appropriate order, thereby closing the vulnerability and safeguarding against any potential exploits.

While this flaw was specific to Besu and did not affect other Ethereum clients, it highlights the importance of consistent cryptographic checks across different software implementations. Discrepancies can lead to divergent client behavior, ultimately threatening the network's consensus and trust.

This incident also underscores the critical role of testing and security measures in blockchain systems. Initiatives like the Pectra audit competition, which helped surface this issue, are crucial for maintaining the ecosystem's resilience by encouraging comprehensive code reviews and vulnerability assessments.

The Ethereum Foundation's proactive approach in reporting this vulnerability and the swift response from the Besu team demonstrate the importance of collaboration and vigilance in maintaining the integrity of blockchain systems.

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on May 28, 2025