XRPL Consensus Mechanism Has Critical Flaw, Attacker Can Paralyze Validator Network - Now Fixed

XRP-0,83%

XRPL修復安全漏洞

Security research firm Common Prefix previously reported two serious security vulnerabilities in the XRP Ledger (XRPL) to the Ripple team. Both vulnerabilities involve the validation nodes’ handling of the consensus mechanism for transaction sets. If a validation node in the Unique Node List (UNL) is compromised, an attacker can send malicious messages, causing a chain reaction of validation node crashes. The related fixes have been integrated into rippled version 3.0.0.

Core Risk of the Vulnerability: One Compromised Validator Can Impact the Entire Network

Ripple漏洞修復

XRPL’s consensus mechanism requires validation nodes to agree on a set of transactions. Each node proposes known unprocessed transactions, and through message exchanges, they reach final consensus on the transaction set. The root cause of both vulnerabilities lies in a flaw in the rippled code’s logic for handling “disputed transactions” (transactions that differ between validation nodes’ transaction sets).

The attack premise involves infiltrating approximately 35 validation nodes in the UNL. Although UNL validation nodes are typically hidden behind proxy nodes and only communicate with them, making infiltration more difficult, Common Prefix researcher Nikolaos Kamarinakis points out that it’s not impossible. Once compromised, an attacker can deploy modified rippled tools to continuously send malicious messages to other validation nodes until the compromised node is removed from the UNL.

Technical Mechanisms and Fixes for the Two Vulnerabilities

Vulnerability 1 — Comparing Transactions: A compromised validation node claims a transaction exists in the SHAMap on a node where it does not. Other nodes attempting to find the transaction ID using an invalid node ID will crash immediately.

Fix 1: Added a verification step to confirm whether the transaction truly exists on the specified node in the proposal, blocking the crash triggered by invalid IDs.

Vulnerability 2 — Relaying Transactions: A compromised validation node sends a malicious transaction set containing arbitrary hashes. Other nodes recognize it as a disputed transaction and attempt to forward it, causing a crash during the “fake transaction check” due to invalid data.

Fix 2: Introduced try-catch exception handling to catch exceptions triggered by malicious data, preventing the crash from propagating outward.

Ripple’s engineering team successfully reproduced both vulnerabilities in isolated test networks using independent verification tools and confirmed that after applying the fixes, nodes receiving malicious messages no longer crash.

Verification and XRPL Security Enhancement Roadmap

The fixes for both vulnerabilities have been incorporated into rippled version 3.0.0. Ripple confirms that in testing environments, nodes with the fixes remain stable when facing the same attack vectors.

Ripple also announced a future roadmap for XRPL security strengthening, including expanding security audits to identify issues before code release, introducing AI-assisted code reviews to systematically detect potential vulnerabilities, hosting security hackathons, and increasing bug bounty rewards to encourage external security researchers to report issues proactively.

Ripple officially thanked Common Prefix in the report, acknowledging their responsible disclosure and full technical cooperation during the fix process.

Frequently Asked Questions

How difficult is it to actually attack these two XRPL vulnerabilities?

An attack requires infiltrating about 35 validation nodes in the UNL. Since UNL validation nodes are usually hidden behind proxy nodes and only communicate with them, the attack surface is relatively limited. However, security researchers note that it’s not impossible, so fixing these vulnerabilities before they are publicly exploited is a necessary precaution.

What actions should XRPL node operators take?

All operators running rippled version 2.6.2 or earlier should upgrade to rippled 3.0.0 as soon as possible to fully protect against these two vulnerabilities. Versions prior to the upgrade are at risk of validation node chain crashes if an attacker infiltrates a UNL validation node.

What does this vulnerability incident mean for the long-term security of XRPL?

This incident exemplifies a standard responsible security disclosure process—Common Prefix privately reported the issues in June 2025, and Ripple fixed them in rippled 3.0.0 before publicly disclosing in March 2026. Ripple’s announcement of a security enhancement roadmap, including AI-assisted code reviews and increased bug bounty rewards, demonstrates ongoing commitment to proactive security development.

View Original
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.
Comment
0/400
No comments