CVE-2026-34061
Analyzed Analyzed - Analysis Complete
Interlink Validation Bypass in nimiq/core-rs-albatross Election Blocks

Publication date: 2026-04-03

Last updated on: 2026-05-05

Assigner: GitHub, Inc.

Description
nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, an elected validator proposer can send an election macro block whose header.interlink does not match the canonical next interlink. Honest validators accept that proposal in verify_macro_block_proposal() because the proposal path validates header shape, successor relation, proposer, body root, and state, but never checks the interlink binding for election blocks. The same finalized block is later rejected by verify_block() during push with InvalidInterlink. Because validators prevote and precommit the malformed header hash itself, the failure happens after Tendermint decides the block, not before voting. This issue has been patched in version 1.3.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-03
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-04-04
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nimiq nimiq_proof-of-stake From 1.2.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-345 The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the nimiq/core-rs-albatross Rust implementation of the Nimiq Proof-of-Stake protocol before version 1.3.0. An elected validator proposer can send an election macro block with a header.interlink that does not match the expected canonical next interlink. Honest validators accept this malformed proposal during the verify_macro_block_proposal() step because the interlink binding is not checked for election blocks. However, the same block is later rejected during the verify_block() step with an InvalidInterlink error. This means the failure occurs after the Tendermint consensus has already decided on the block, not before voting.


How can this vulnerability impact me? :

The impact of this vulnerability is an availability issue, as indicated by the CVSS score. Because the malformed block is accepted initially but rejected later, it can cause disruptions in the consensus process. Validators may waste resources processing invalid blocks, and the network could experience delays or interruptions in block finalization. The CVSS score rates the impact as having no confidentiality or integrity loss but a high impact on availability.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, upgrade the nimiq/core-rs-albatross implementation to version 1.3.0 or later, where the issue has been patched.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart