Description
go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node can be forced to shutdown/crash using a specially crafted message. This vulnerability is fixed in 1.16.8.
Published: 2026-01-13
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch Immediately
AI Analysis

Impact

A specially crafted peer‑to‑peer message sent to a go‑ethereum (geth) node can trigger a crash or forced shutdown, resulting in a denial of service. The flaw is an input‑validation error (CWE‑20) that allows the node to process malformed data without proper checks, causing the node to become unavailable and disrupting its participation in the Ethereum network.

Affected Systems

All releases of go‑ethereum earlier than version 1.16.8 are affected. Any node operating one of these versions can be brought down by an attacker that can connect to it on the network and send the malicious message.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity issue. The EPSS score of less than 1% suggests that the probability of exploitation in the wild has been very low, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector is remote over the peer‑to‑peer network, requiring that the node accept a crafted message from another node on the network.

Generated by OpenCVE AI on April 18, 2026 at 19:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade go‑ethereum to version 1.16.8 or later.
  • Restart the node after the upgrade to ensure that any crashes caused by the vulnerability are cleared.
  • Apply network‑level filtering or firewall rules to limit inbound connections to trusted peers, reducing the chance that malicious messages reach the node.

Generated by OpenCVE AI on April 18, 2026 at 19:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mr7q-c9w9-wh4h go-ethereum is vulnerable to DoS via malicious p2p message affecting a vulnerable node
History

Thu, 29 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:ethereum:go_ethereum:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Thu, 15 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 14 Jan 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Ethereum
Ethereum go Ethereum
Vendors & Products Ethereum
Ethereum go Ethereum

Tue, 13 Jan 2026 20:45:00 +0000

Type Values Removed Values Added
Description go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node can be forced to shutdown/crash using a specially crafted message. This vulnerability is fixed in 1.16.8.
Title go-ethereum has a DoS via malicious p2p message
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Ethereum Go Ethereum
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-15T16:37:30.177Z

Reserved: 2026-01-12T16:20:16.746Z

Link: CVE-2026-22862

cve-icon Vulnrichment

Updated: 2026-01-15T16:37:27.152Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T21:15:54.613

Modified: 2026-01-29T18:03:38.380

Link: CVE-2026-22862

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T20:00:09Z

Weaknesses