Jan 5, 2026·5 min read·2 visits
Frontier's implementation of the `modexp` precompile underpriced operations involving even numbers. Because the underlying math library is significantly slower at processing even moduli than odd ones, attackers could spam cheap transactions that consumed massive amounts of CPU, effectively halting block production for a fraction of the intended cost.
A critical algorithmic complexity vulnerability in the Frontier Ethereum compatibility layer allowed attackers to trigger denial-of-service conditions by exploiting the performance discrepancy between odd and even moduli in modular exponentiation calculations.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
Frontier Parity Technologies | <= 0.1.0 | PR #1017 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-682 (Incorrect Calculation) |
| Attack Vector | Network (Remote) |
| CVSS Score | 7.5 (High) |
| EPSS Score | 0.00249 (Low Prob) |
| Impact | Denial of Service (DoS) |
| Exploit Status | PoC / Trivial |
The product performs a calculation that generates incorrect or inaccurate results that can be exploited to cause a denial of service.