Impact
The libp2p-rust implementation fails to limit pagination cookies stored by the rendezvous server. An unauthenticated peer can repeatedly issue DISCOVER requests, causing unbounded memory allocation and eventual exhaustion of system resources. This deficiency matches CWE‑770, yielding a denial‑of‑service impact.
Affected Systems
Vulnerable versions of the Rust libp2p library—any release prior to 0.17.1—is affected. Devices or services that run a libp2p rendezvous server with these versions would be impacted.
Risk and Exploitability
The CVSS score of 8.2 indicates a high severity. While no EPSS value is available, the lack of authentication control and the ability to trigger the vulnerability remotely via network DISCOVER requests make exploitation likely. The vulnerability is not listed in the CISA KEV catalog but poses a risk of service disruption if exploited, especially in environments where the rendezvous server is publicly accessible.
OpenCVE Enrichment
Github GHSA