Impact
A specially crafted peer‑to‑peer message sent to a go‑ethereum (geth) node can trigger a crash or forced shutdown, resulting in a denial of service. The flaw is an input‑validation error (CWE‑20) that allows the node to process malformed data without proper checks, causing the node to become unavailable and disrupting its participation in the Ethereum network.
Affected Systems
All releases of go‑ethereum earlier than version 1.16.8 are affected. Any node operating one of these versions can be brought down by an attacker that can connect to it on the network and send the malicious message.
Risk and Exploitability
The CVSS score of 7.1 indicates a high severity issue. The EPSS score of less than 1% suggests that the probability of exploitation in the wild has been very low, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector is remote over the peer‑to‑peer network, requiring that the node accept a crafted message from another node on the network.
OpenCVE Enrichment
Github GHSA