Close Menu
    Facebook X (Twitter) Instagram
    Wednesday, July 2
    X (Twitter) Instagram LinkedIn YouTube
    Chain Tech Daily
    Banner
    • Altcoins
    • Bitcoin
    • Crypto
    • Coinbase
    • Litecoin
    • Ethereum
    • Blockchain
    • Lithosphere News Releases
    Chain Tech Daily
    You are at:Home » Security Advisory [Insecurely configured geth can make funds remotely accessible]
    Ethereum

    Security Advisory [Insecurely configured geth can make funds remotely accessible]

    Olivia MartinezBy Olivia MartinezFebruary 16, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Insecurely configured Ethereum clients with no firewall and unlocked accounts can lead to funds being accessed remotely by attackers.

    Affected configurations: Issue reported for Geth, though all implementations incl. C++ and Python can in principle display this behavior if used insecurely; only for nodes which leave the JSON-RPC port open to an attacker (this precludes most nodes on internal networks behind NAT), bind the interface to a public IP, and simultaneously leave accounts unlocked at startup.

    Likelihood: Low

    Severity: High

    Impact: Loss of funds related to wallets imported or generated in clients

    Details:

    It’s come to our attention that some individuals have been bypassing the built-in security that has been placed on the JSON-RPC interface. The RPC interface allows you to send transactions from any account which has been unlocked prior to sending a transaction and will stay unlocked for the entirety of the the session.

    By default, RPC is disabled, and by enabling it it is only accessible from the same host on which your Ethereum client is running. By opening the RPC to be accessed by anyone on the internet and not including a firewall rules, you open up your wallet to theft by anybody who knows your address in combination with your IP.

     

    Effects on expected chain reorganisation depth: none

    Remedial action taken by Ethereum: eth RC1 will be fully secure by requiring explicit user-authorisation for any potentially remote transaction. Later versions of Geth may support this functionality.

    Proposed temporary workaround: Only run the default settings for each client and when you do make changes understand how these changes impact your security.

     

    NOTE: This is not a bug, but a misuse of JSON-RPC.

     

    ADVISORY: Never enable JSON-RPC interface on an internet-accessible machine without a firewall policy in place to block the JSON-RPC port (default: 8545).

     

    eth: Use RC1 or later.

     

    geth: Use the safe defaults, and know security implications of the options.

    –rpcaddr  “127.0.0.1”. This is the default value to only allow connections originating on the local computer; remote RPC connections are disabled

    –unlock. This parameter is used to unlock accounts at startup to aid in automation. By default, all accounts are locked



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleTrueUSD firms dodge fraud claims with SEC settlement
    Next Article Caroline Ellison sentenced to two years for FTX-Alameda fraud
    Olivia Martinez

    Related Posts

    Katana mainnet launch nears as pre-deposit closes with $200M in active deposits

    June 30, 2025

    Announcing Protocol | Ethereum Foundation Blog

    June 29, 2025

    Announcing the Devconnect ARG Scholars Program

    June 28, 2025
    Leave A Reply Cancel Reply

    Don't Miss

    OFAC sanctions crypto wallets tied to Russian bulletproof hosting provider Aeza Group

    Bit Digital raises $162.9M to buy more ETH for its treasury

    AGII Enhances Real-Time Protocol Safety With Predictive Automation Models

    SEC nods conversion of Grayscale crypto large-cap fund to ETF

    About
    About

    ChainTechDaily.com is your daily destination for the latest news and developments in the cryptocurrency space. Stay updated with expert insights and analysis tailored for crypto enthusiasts and investors alike.

    X (Twitter) Instagram YouTube LinkedIn
    Popular Posts

    OFAC sanctions crypto wallets tied to Russian bulletproof hosting provider Aeza Group

    July 2, 2025

    Bit Digital raises $162.9M to buy more ETH for its treasury

    July 2, 2025

    AGII Enhances Real-Time Protocol Safety With Predictive Automation Models

    July 2, 2025
    Lithosphere News Releases

    AGII Enhances Real-Time Protocol Safety With Predictive Automation Models

    July 2, 2025

    AGII Deploys AI Reasoning Systems for Smart Contract Intelligence

    June 30, 2025

    Imagen Network Taps Solana to Roll Out AI-Powered Social Features for Decentralized Growth

    June 30, 2025
    Copyright © 2025

    Type above and press Enter to search. Press Esc to cancel.