Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-33471— nimiq-block has skip block quorum bypass via out-of-range BitSet indices & u16 truncation

CVSS 9.6 · Critical EPSS 0.03% · P9
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-33471

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
nimiq-block has skip block quorum bypass via out-of-range BitSet indices & u16 truncation
Source: NVD (National Vulnerability Database)
Vulnerability Description
nimiq-block contains block primitives to be used in Nimiq's Rust implementation. `SkipBlockProof::verify` computes its quorum check using `BitSet.len()`, then iterates `BitSet` indices and casts each `usize` index to `u16` (`slot as u16`) for slot lookup. Prior to version 1.3.0, if an attacker can get a `SkipBlockProof` verified where `MultiSignature.signers` contains out-of-range indices spaced by 65536, these indices inflate `len()` but collide onto the same in-range `u16` slot during aggregation. This makes it possible for a malicious validator with far fewer than `2f+1` real signer slots to pass skip block proof verification by multiplying a single BLS signature by the same factor. The patch for this vulnerability is included as part of v1.3.0. No known workarounds are available.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Nimiq 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Nimiq是Nimiq开源的一个Albatross协议的Rust实现。 Nimiq 1.3.0之前版本存在输入验证错误漏洞,该漏洞源于nimiq-block中SkipBlockProof::verify使用BitSet.len()计算法定人数检查,然后迭代BitSet索引并将每个usize索引转换为u16进行插槽查找,如果攻击者能让MultiSignature.signers包含间隔65536的超范围索引,这些索引会增大len()但在聚合期间碰撞到同一范围内u16插槽,使得恶意验证者可用远少于2f+1个真
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
nimiqnimiq-block < 1.3.0 -

II. Public POCs for CVE-2026-33471

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-33471

登录查看更多情报信息。

Same Patch Batch · nimiq · 2026-04-22 · 8 CVEs total

CVE-2026-340637.5 HIGHnetwork-libp2p: Peer can crash the node by opening discovery protocol substream twice
CVE-2026-340657.5 HIGHnimiq-primitives: Node crash due to missing interlink validation in election macro block p
CVE-2026-340686.8 MEDIUMnimiq-transaction: UpdateValidator transactions allows voting key change without proof-of-
CVE-2026-340625.3 MEDIUMNimiq has Allocation of Resources Without Limits or Throttling in its libp2p request/respo
CVE-2026-340645.3 MEDIUMnimiq-account: Vesting insufficient funds error can panic
CVE-2026-340665.3 MEDIUMnimiq-blockchain: Peer-triggerable panic during history sync
CVE-2026-340673.1 LOWnimiq-transaction vulnerable to panic via `HistoryTreeProof` length mismatch

IV. Related Vulnerabilities

V. Comments for CVE-2026-33471

No comments yet


Leave a comment