MWR InfoSecurity released an advisory on a vulnerability admittedly found in Monero wallets. The coin devs have replied with a harsh statement on the discovery criticising it as “a largely useless observation.”To begin with, the MWR Labs team offered an overly generalised and inaccurate overview of the vulnerability by providing examples of Monero wallet platforms that have been discontinued or improperly structured. The RPC authentication vulnerability and the CSRF attack have been discussed on several occasions dating back to 2014, when they were brought to light by Coinspect’s Juliano Rizzo, so this time it was certainly not a “discovery”.
According to Monero Core Developer Riccardo Spagni (fluffypony), the unauthenticated RPC is the only way for exchanges, mining pools and integrators to integrate Monero as they are unaffected by the CSRF attack. It is usually not and must not be utilised by wallet service providers that run a browser in the background to integrate Monero.
If hackers gain access to certain Monero wallet platforms through the CSRF vulnerability, the responsibility should be wholly taken by the wallet operator that created an unsecure ecosystem for users.
The claim made by the MWR Labs team could be compared to one saying that the world’s banking systems are extremely vulnerable because a bank experienced a physical theft after leaving a vault wide open for anyone to enter.
Source:
http://www.coinfox.info/news/6454-monero-wallets-vulnerable-or-not