Description
go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. Prior to version 1.17.0, an attacker can cause high memory usage by sending a specially-crafted p2p message. The issue is resolved in the v1.17.0 release.
Published: 2026-02-19
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via high memory usage
Action: Upgrade
AI Analysis

Impact

A specially-crafted peer-to-peer message can cause the Go Ethereum client to allocate excessive memory, resulting in a denial of service. The vulnerability is a type of resource exhaustion flaw, mapped to CWE-770, and can severely impact the availability of the node by exhausting local system memory. If exploited, the attacker may interdict the node’s ability to process normal traffic, potentially affecting the decentralised network it supports.

Affected Systems

The vulnerability affects the Go Ethereum (geth) client for all versions earlier than 1.17.0. Users of any operating system that installs geth under the Ethereum organization’s open source distribution are impacted. The issue was fully patched in release 1.17.0.

Risk and Exploitability

The vulnerability carries a CVSS score of 6.9, indicating a moderate severity. The EPSS score is less than 1%, meaning active exploitation is currently considered unlikely. The vulnerability is not listed in CISA’s KEV catalog. The attack vector is primarily remote, through a malicious p2p message sent over the Ethereum peer‑to‑peer network; the attacker does not need to compromise the node locally. Exploitation requires the node to accept the crafted message and process it without proper memory controls.

Generated by OpenCVE AI on April 17, 2026 at 17:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Go Ethereum to version 1.17.0 or later to apply the vendor‑provided fix.
  • Restrict connections to trusted peers by configuring the node’s P2P settings or using a firewall to limit inbound traffic.
  • Monitor memory consumption and set operating system resource limits to detect and mitigate anomalous memory usage spikes.

Generated by OpenCVE AI on April 17, 2026 at 17:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-689v-6xwf-5jf3 Go Ethereum affected by DoS via malicious p2p message
History

Mon, 23 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:ethereum:go_ethereum:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Fri, 20 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Ethereum
Ethereum go Ethereum
Vendors & Products Ethereum
Ethereum go Ethereum

Thu, 19 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Description go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. Prior to version 1.17.0, an attacker can cause high memory usage by sending a specially-crafted p2p message. The issue is resolved in the v1.17.0 release.
Title Go Ethereum affected by DoS via malicious p2p message
Weaknesses CWE-770
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Ethereum Go Ethereum
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-20T19:53:54.846Z

Reserved: 2026-02-13T16:27:51.807Z

Link: CVE-2026-26313

cve-icon Vulnrichment

Updated: 2026-02-20T19:53:49.667Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-19T21:18:31.980

Modified: 2026-02-23T18:41:53.410

Link: CVE-2026-26313

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T18:00:12Z

Weaknesses