Description
nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, an untrusted peer could crash a validator by publishing a signed tendermint proposal message where signer == validators.num_validators(). ProposalSender::send uses > instead of >= for the signer bounds check, so the equality case passes and reaches validators.get_validator_by_slot_band(signer), which panics with an out-of-bounds index before any signature verification runs. This issue has been fixed in version 1.3.0.
Published: 2026-04-13
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service (Remote Crash)
Action: Apply Patch
AI Analysis

Impact

An off‑by‑one error in the signer bounds check of the ProposalSender::send function allows an unauthenticated peer to cause a validator node to panic. By sending a signed Tendermint proposal where the signer field equals the number of validators, the check mistakenly accepts the value, leading to an out‑of‑bounds array access and a crash before any signature verification occurs. The vulnerability falls under CWE‑125 (Out‑of‑Bounds Read) and CWE‑193 (Off‑by‑One Errors), resulting in a Denial of Service that prevents the affected node from participating in the network.

Affected Systems

Nimiq’s core‑rs‑albatross is a Rust implementation of the Nimiq Proof‑of‑Stake protocol and the Albatross consensus algorithm. Versions prior to 1.3.0 are affected. The flaw is present in the core‑rs‑albatross software distributed by the Nimiq project.

Risk and Exploitability

The CVSS score of 7.5 indicates a high impact, but the absence of an EPSS score means the exact likelihood cannot be quantified from the data. The vulnerability is not listed in the CISA KEV catalog, yet it can be exploited over the network by an untrusted peer simply by broadcasting a malformed proposal. The attack does not require privileged access; the write‑time is minimal, making it feasible. As such, the risk to networks running vulnerable nodes is significant and warrants prompt remediation.

Generated by OpenCVE AI on April 13, 2026 at 20:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Nimiq core‑rs‑albatross to version 1.3.0 or newer

Generated by OpenCVE AI on April 13, 2026 at 20:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 24 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Nimiq nimiq Proof-of-stake
CPEs cpe:2.3:a:nimiq:nimiq_proof-of-stake:*:*:*:*:*:rust:*:*
Vendors & Products Nimiq nimiq Proof-of-stake

Thu, 16 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Nimiq
Nimiq core-rs-albatross
Vendors & Products Nimiq
Nimiq core-rs-albatross

Mon, 13 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, an untrusted peer could crash a validator by publishing a signed tendermint proposal message where signer == validators.num_validators(). ProposalSender::send uses > instead of >= for the signer bounds check, so the equality case passes and reaches validators.get_validator_by_slot_band(signer), which panics with an out-of-bounds index before any signature verification runs. This issue has been fixed in version 1.3.0.
Title Nimiq: Remote crash via off-by-one signer bounds check in proposal buffer
Weaknesses CWE-125
CWE-193
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Nimiq Core-rs-albatross Nimiq Proof-of-stake
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-16T13:26:40.930Z

Reserved: 2026-03-12T14:54:24.270Z

Link: CVE-2026-32605

cve-icon Vulnrichment

Updated: 2026-04-16T13:26:25.753Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-13T20:16:33.787

Modified: 2026-04-24T17:11:26.693

Link: CVE-2026-32605

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:33:32Z

Weaknesses