VYPR
High severityNVD Advisory· Published Jul 28, 2020· Updated Aug 4, 2024

CVE-2020-15899

CVE-2020-15899

Description

Grin 3.0.0 before 4.0.0 has insufficient validation of data related to Mimblewimble.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Grin 3.0.0 through 3.1.1 contains a critical flaw in Cuckaroom29 PoW verification, allowing attackers to mine blocks up to 1000x faster and potentially rewrite history.

Analysis of

CVE-2020-15899

A critical vulnerability existed in the Grin cryptocurrency implementation (versions 3.0.0 to 3.1.1) due to an oversight in the Cuckaroom29 proof-of-work (PoW) verification code. The bug caused the number of nodes in a valid graph to be restricted to half the expected size (2^28 instead of 2^29), effectively reducing the mining difficulty for an attacker [1].

Exploitation required no authentication or network access beyond what a typical Grin node provides. An attacker could craft solutions that passed verification with a speedup of 1000x or more, enabling them to mine blocks at a vastly faster rate than honest miners. The vulnerability was introduced in the implementation of the Cuckaroom29 PoW algorithm and was not detected until a core developer reviewed the code [1].

The impact was severe: an attacker could generate an alternative chain from the previous hard fork (HF2) that would be valid under the longest-chain rule, potentially overtaking the legitimate chain. This could have led to double-spending and chain reorganization. However, the Grin security team confirmed that the vulnerability was never exploited in the wild [1].

The flaw was quietly fixed in the v4.0.0-rc.1 release as part of a mandatory upgrade ahead of the scheduled hard fork on July 16, 2020 (HF3). Users running v4.0.0 or later are not affected; no other mitigations are required [1][3].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
grincrates.io
>= 3.0.0, < 4.0.04.0.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.