Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-34063— network-libp2p: Peer can crash the node by opening discovery protocol substream twice

CVSS 7.5 · High EPSS 0.05% · P15
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-34063

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
network-libp2p: Peer can crash the node by opening discovery protocol substream twice
Source: NVD (National Vulnerability Database)
Vulnerability Description
Nimiq's network-libp2p is a Nimiq network implementation based on libp2p. Prior to version 1.3.0, `network-libp2p` discovery uses a libp2p `ConnectionHandler` state machine. the handler assumes there is at most one inbound and one outbound discovery substream per connection. if a remote peer opens/negotiate the discovery protocol substream a second time on the same connection, the handler hits a `panic!(\"Inbound already connected\")` / `panic!(\"Outbound already connected\")` path instead of failing closed. This causes a remote crash of the networking task (swarm), taking the node's p2p networking offline until restart. The patch for this vulnerability is formally released as part of v1.3.0. No known workarounds are available.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
可达断言
Source: NVD (National Vulnerability Database)
Vulnerability Title
Nimiq 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Nimiq是Nimiq开源的一个Albatross协议的Rust实现。 Nimiq 1.3.0之前版本存在安全漏洞,该漏洞源于network-libp2p发现使用libp2p ConnectionHandler状态机。该处理程序假设每个连接最多有一个入站和一个出站发现子流。如果远程对等方在同一连接上第二次打开/协商发现协议子流,处理程序会触发panic!,导致网络任务崩溃,使节点的p2p网络离线直至重启。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
nimiqnetwork-libp2p < 1.3.0 -

II. Public POCs for CVE-2026-34063

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-34063

登录查看更多情报信息。

Same Patch Batch · nimiq · 2026-04-22 · 8 CVEs total

CVE-2026-334719.6 CRITICALnimiq-block has skip block quorum bypass via out-of-range BitSet indices & u16 truncation
CVE-2026-340657.5 HIGHnimiq-primitives: Node crash due to missing interlink validation in election macro block p
CVE-2026-340686.8 MEDIUMnimiq-transaction: UpdateValidator transactions allows voting key change without proof-of-
CVE-2026-340625.3 MEDIUMNimiq has Allocation of Resources Without Limits or Throttling in its libp2p request/respo
CVE-2026-340645.3 MEDIUMnimiq-account: Vesting insufficient funds error can panic
CVE-2026-340665.3 MEDIUMnimiq-blockchain: Peer-triggerable panic during history sync
CVE-2026-340673.1 LOWnimiq-transaction vulnerable to panic via `HistoryTreeProof` length mismatch

IV. Related Vulnerabilities

V. Comments for CVE-2026-34063

No comments yet


Leave a comment