CVE-2026-34062
Received Received - Intake
Denial of Service via Stalled Substreams in nimiq-libp2p Prior to

Publication date: 2026-04-22

Last updated on: 2026-04-24

Assigner: GitHub, Inc.

Description
nimiq-libp2p is a Nimiq network implementation based on libp2p. Prior to version 1.3.0, `MessageCodec::read_request` and `read_response` call `read_to_end()` on inbound substreams, so a remote peer can send only a partial frame and keep the substream open. because `Behaviour::new` also sets `with_max_concurrent_streams(1000)`, the node exposes a much larger stalled-slot budget than the library default. The patch for this vulnerability is formally released as part of v1.3.0. No known workarounds are available.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-22
Last Modified
2026-04-24
Generated
2026-05-07
AI Q&A
2026-04-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nimiq nimiq_proof-of-stake to 1.3.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-770 The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability CVE-2026-34062 causes resource exhaustion through allocation of resources without limits or throttling, leading to partial denial of service. However, it does not impact confidentiality or integrity of data.

Since the vulnerability does not result in unauthorized access, data leakage, or modification, it does not directly affect compliance with data protection regulations such as GDPR or HIPAA, which primarily focus on protecting personal data confidentiality and integrity.

Nevertheless, the availability impact (partial denial of service) could indirectly affect service reliability requirements under some standards, but there is no explicit mention of compliance impact in the provided information.


Can you explain this vulnerability to me?

The vulnerability exists in the nimiq-libp2p network implementation prior to version 1.3.0. Specifically, the functions MessageCodec::read_request and read_response call read_to_end() on inbound substreams, allowing a remote peer to send only a partial frame and keep the substream open indefinitely.

Because the Behaviour::new function sets with_max_concurrent_streams to 1000, the node exposes a much larger stalled-slot budget than the library default, which can be exploited by an attacker.

This means an attacker can keep many substreams open by sending partial frames, potentially exhausting resources.

The vulnerability was fixed in version 1.3.0, and no known workarounds are available.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing a remote peer to keep many substreams open with partial frames, effectively stalling the node's resources.

Because the node allows up to 1000 concurrent streams, an attacker can exhaust the stalled-slot budget, potentially leading to denial of service (DoS) conditions.

This can degrade the performance or availability of the node in the Nimiq network.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability is fixed in nimiq-libp2p version 1.3.0. The immediate step to mitigate this vulnerability is to upgrade your nimiq-libp2p implementation to version 1.3.0 or later.

No known workarounds are available.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves a remote peer sending partial frames and keeping substreams open indefinitely, leading to resource exhaustion by stalling many concurrent substreams. Detection would involve monitoring for unusually high numbers of stalled or half-open substreams or connections in the nimiq-libp2p network implementation.

Since the vulnerability is related to the behavior of the network streams and resource exhaustion, you can detect it by observing network connections and resource usage patterns on nodes running vulnerable versions (≀ 1.2.2).

Specific commands to detect this might include:

  • Using system tools like `netstat` or `ss` to identify many open or half-open TCP connections related to the nimiq-libp2p service.
  • Monitoring process resource usage with `top` or `htop` to detect unusually high memory or file descriptor consumption.
  • Using application-level logging or metrics (if available) to track the number of concurrent streams or substreams and detect if the count approaches or exceeds the configured limit (1000).

No specific detection commands or tools are provided in the available resources.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart