
Briefing
The Cardano mainnet suffered a critical consensus failure on November 21st, resulting from a malicious, malformed delegation transaction. This exploit immediately led to a divergence in the blockchain’s history, effectively splitting the network into two separate chains and causing validators to lose block rewards. The root cause was a fault in the core software library that failed to validate an oversized deserialization hash, a vulnerability dating back to 2022.

Context
The security posture of Layer 1 protocols is fundamentally reliant on the integrity of their core software libraries and transaction validation logic. This class of vulnerability ∞ where a legacy or unused code path contains a flaw ∞ represents a persistent, low-visibility attack surface. The incident proves that formal verification must extend to all transaction types and core infrastructure components, as the specific deserialization hash error was present since 2022 but only recently exploited.

Analysis
The attack vector leveraged a specific deserialization hash error within the core software library, which was previously unused. The attacker submitted a delegation transaction containing a hash of excessive size, which the validation code failed to reject. This unvalidated, malformed transaction caused a divergence in block production, leading to an immediate and involuntary chain split as nodes processed the anomalous block differently. Although user funds were confirmed to be unaffected, the failure compromised network synchronization and led to significant operational disruption.

Parameters
- Affected Protocol ∞ Cardano Mainnet
- Attack Vector ∞ Malformed Delegation Transaction / Core Software Flaw
- Key Vulnerability ∞ Deserialization Hash Error (allowing oversized input)
- Financial Impact ∞ User Funds Unaffected; Validator Block Rewards Lost
- Mitigation ∞ Emergency Software Update Released

Outlook
Immediate mitigation involved the rapid deployment of an emergency software update to patch the core library flaw and restore network synchronization. This incident underscores the systemic risk of legacy code vulnerabilities in Layer 1 protocols and will likely establish new best practices for comprehensive, full-stack validation checks, particularly for transaction types that interact with core consensus mechanisms. All protocols must now prioritize auditing unused or deprecated code paths for hidden logic flaws.

Verdict
This protocol-level consensus failure confirms that even well-established Layer 1 networks are susceptible to systemic disruption from deep-seated, low-visibility software library flaws.
