Impact
A malformed Ed25519 signature length check in the Nimiq blockchain's DHT verifier leads to a panic that terminates the full node process. The security weakness enumerated as CWE‑252 causes the verifier to unwrap a failed signature conversion and crash, resulting in loss of availability for the affected node. The issue is triggered by a crafted network record and thus can be exploited remotely by any peer that can inject a malicious DHT entry.
Affected Systems
The vulnerability affects the Nimiq core‑rs‑albatross implementation of the Nimiq blockchain. Full nodes running version 1.3.0 or earlier are susceptible; the fix is incorporated in the 1.4.0 release. Users running earlier releases should upgrade to 1.4.0 or later to eliminate the crash vector.
Risk and Exploitability
The CVSS score of 7.5 classifies this flaw as high severity, reflecting the serious impact on node availability. EPSS data are not available, so the exploitation likelihood cannot be quantified, but the fault can be triggered by any malicious peer in the network without authentication. This vulnerability is not listed in the CISA KEV catalog, yet remote exploitation of a node in a production network remains a tangible threat.
OpenCVE Enrichment
Github GHSA