Description
go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. Prior to version 1.16.9, a vulnerable node can be forced to shutdown/crash using a specially crafted message. The problem is resolved in the v1.16.9 and v1.17.0 releases of Geth.
Published: 2026-02-19
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch Now
AI Analysis

Impact

The vulnerability allows a specially crafted peer‑to‑peer message to cause the geth node to crash, resulting in a denial of service. It is a flaw in input validation (CWE‑20) that leads to unexpected termination of the execution layer. An attacker cannot compromise confidentiality or integrity, but can render the affected node unavailable for as long as the crash persists.

Affected Systems

Ethereum’s Go implementation, geth, is affected in all releases prior to version 1.16.9 and 1.17.0. Users running any earlier version than 1.16.9, including patches before the 1.16.9 release, are susceptible.

Risk and Exploitability

This vulnerability has a CVSS score of 8.7, indicating high severity. The EPSS score is below 1%, suggesting a low probability of exploitation at present. It is not listed in CISA’s KEV catalog. An attacker can exploit it by sending the crafted message through the standard peer‑to‑peer protocol; no local privileges or additional conditions are required beyond network reachability to the node.

Generated by OpenCVE AI on April 17, 2026 at 17:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade geth to version 1.16.9 or later (including 1.17.0 and any subsequent releases)
  • Configure the node to accept connections only from trusted peers or restrict access via firewall rules
  • Set up automated monitoring or watchdog functionality to detect a crash and restart the node promptly

Generated by OpenCVE AI on April 17, 2026 at 17:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2gjw-fg97-vg3r Go Ethereum affected by DoS via malicious p2p message
History

Mon, 23 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:ethereum:go_ethereum:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Fri, 20 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Ethereum
Ethereum go Ethereum
Vendors & Products Ethereum
Ethereum go Ethereum

Thu, 19 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
Description go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. Prior to version 1.16.9, a vulnerable node can be forced to shutdown/crash using a specially crafted message. The problem is resolved in the v1.16.9 and v1.17.0 releases of Geth.
Title Go Ethereum affected by DoS via malicious p2p message
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Ethereum Go Ethereum
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-20T15:42:28.197Z

Reserved: 2026-02-13T16:27:51.807Z

Link: CVE-2026-26314

cve-icon Vulnrichment

Updated: 2026-02-20T15:32:20.431Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-19T22:16:46.813

Modified: 2026-02-23T18:32:26.913

Link: CVE-2026-26314

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T18:00:12Z

Weaknesses