CVE-2019-12999
Description
Lightning Network Daemon (lnd) before 0.7 allows attackers to trigger loss of funds because of Incorrect Access Control.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Lightning Network Daemon (lnd) before 0.7.0 has an incorrect access control vulnerability that can allow attackers to trigger loss of funds.
Vulnerability
Overview
CVE-2019-12999 is an incorrect access control vulnerability in Lightning Network Daemon (lnd) before version 0.7.0-beta [1]. The root cause lies in a bug that could allow an attacker to open invalid channels or manipulate payment forwarding in a way that leads to fund loss for the node operator [1][4]. The issue was addressed in the v0.7.0-beta release, which included important bug fixes along with other improvements [1].
Attack
Vector and Prerequisites
The vulnerability can be exploited without requiring special privileges on the target node. An attacker can craft and open invalid channels with a victim lnd node [4]. Once such a channel is established, the attacker may be able to use it to forward payments that result in loss of funds from the victim's node [4]. The attacker needs to be able to establish a channel with the target, meaning they must be part of the Lightning Network and connect to the victim's node via the peer-to-peer protocol. No authentication beyond that required to open a normal channel is needed [1][4].
Impact
A successful exploit allows the attacker to trigger loss of funds from the victim's lnd node [1][4]. The tool chanleakcheck was developed to help node operators determine if their node was targeted by this CVE and to quantify any lost coins [4]. The impact is financial loss directly affecting Bitcoin or other Lightning Network assets controlled by the node.
Mitigation
The vulnerability is fixed in lnd version 0.7.0-beta and later [1]. Users are strongly advised to upgrade to this release. For those who may have been affected, the chanleakcheck tool [4] can be used to detect exploitation and assess damage. There is no workaround for unpatched versions; upgrading is the only complete mitigation.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/lightningnetwork/lndGo | < 0.7.1-beta | 0.7.1-beta |
Affected products
2- Lightning Network Daemon/Lightning Network Daemondescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-78hj-86cr-6j2vghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-12999ghsaADVISORY
- github.com/lightningnetwork/lnd/commits/masterghsax_refsource_MISCWEB
- github.com/lightningnetwork/lnd/releases/tag/v0.7.0-betaghsax_refsource_MISCWEB
- lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.htmlghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.