UltraDAG EUVD-2026-24179

| CVE-2026-40583 HIGH
Improper Cleanup on Thrown Exception (CWE-460)
2026-04-21 [email protected]
8.8
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Red
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

2
Re-analysis Queued
Apr 21, 2026 - 21:22 vuln.today
cvss_changed
Analysis Generated
Apr 21, 2026 - 17:36 vuln.today

DescriptionNVD

UltraDAG is a minimal DAG-BFT blockchain in Rust. In version 0.1, a non-council attacker can submit a signed SmartOp::Vote transaction that passes signature, nonce, and balance prechecks, but fails authorization only after state mutation has already occurred.

AnalysisAI

State corruption in UltraDAG 0.1 allows remote unauthenticated attackers to bypass authorization controls and manipulate blockchain state integrity through malformed SmartOp::Vote transactions. The vulnerability enables attackers to trigger state mutations before authorization checks complete, causing high availability impact and low integrity impact to the blockchain. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Inventory all systems running UltraDAG 0.1 and isolate production instances from untrusted network segments; document current blockchain state and prepare rollback procedures. Within 7 days: Contact UltraDAG upstream maintainers to identify confirmed release versions containing the GitHub fix commits; evaluate and test patched versions in non-production environments. …

Sign in for detailed remediation steps.

Share

EUVD-2026-24179 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy