Impact
The vulnerability is a denial‑of‑service that enables an attacker to crash a running go‑ethereum node by sending a crafted peer‑to‑peer message. When the node processes the malformed message it terminates, causing the node to become unavailable. The flaw is an input validation weakness that forces the node to crash without compromising confidentiality or integrity.
Affected Systems
Affected product: ethereum:go‑ethereum (go‑ethereum, commonly called geth). Any Ethereum client running an older release before 1.16.8 is susceptible. In particular, nodes that have not applied the patch listed in the advisory are at risk.
Risk and Exploitability
CVSS 7.1 indicates moderate to high severity. EPSS <1% suggests low exploitation probability, and it is not listed in KEV, indicating no known exploits are reported. The likely attack vector is network‑based: any peer that can send a p2p message to the node can craft the malicious packet. No authentication is required, so an attacker who can reach the node over the public network could trigger a crash, disrupting the node’s services.
OpenCVE Enrichment
Github GHSA