Skip to main content

CVE-2022-29177: CWE-400: Uncontrolled Resource Consumption in ethereum go-ethereum

Medium
Published: Fri May 20 2022 (05/20/2022, 16:20:10 UTC)
Source: CVE
Vendor/Project: ethereum
Product: go-ethereum

Description

Go Ethereum is the official Golang implementation of the Ethereum protocol. Prior to version 1.10.17, a vulnerable node, if configured to use high verbosity logging, can be made to crash when handling specially crafted p2p messages sent from an attacker node. Version 1.10.17 contains a patch that addresses the problem. As a workaround, setting loglevel to default level (`INFO`) makes the node not vulnerable to this attack.

AI-Powered Analysis

AILast updated: 06/23/2025, 08:36:32 UTC

Technical Analysis

CVE-2022-29177 is a medium-severity vulnerability affecting the Go Ethereum (geth) client, which is the official Golang implementation of the Ethereum protocol. The vulnerability is classified under CWE-400: Uncontrolled Resource Consumption. Specifically, in versions of go-ethereum prior to 1.10.17, a node configured with high verbosity logging can be forced to crash by an attacker sending specially crafted peer-to-peer (p2p) messages. The root cause lies in the excessive resource consumption triggered by processing these malicious messages when verbose logging is enabled. This can lead to denial of service (DoS) conditions, as the node becomes unresponsive or crashes. The vulnerability does not require authentication but does require the node to be reachable over the p2p network and configured with a high verbosity log level, which is not the default setting. The issue was addressed in version 1.10.17 by patching the handling of these p2p messages. As a temporary mitigation, reducing the log verbosity level to the default INFO level prevents exploitation. There are no known exploits in the wild reported to date. This vulnerability impacts the availability of Ethereum nodes running vulnerable versions, potentially disrupting blockchain operations or services relying on these nodes.

Potential Impact

For European organizations, especially those operating Ethereum nodes for blockchain infrastructure, financial services, decentralized applications (dApps), or enterprise blockchain solutions, this vulnerability poses a risk of denial of service. A successful attack could cause node crashes, leading to temporary loss of service, delayed transaction processing, or reduced network reliability. This can affect crypto exchanges, fintech companies, and blockchain service providers that rely on stable node operation. Additionally, organizations using private Ethereum networks or consortium blockchains based on go-ethereum could face operational disruptions. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can have downstream effects on business continuity and trust in blockchain services. Given the increasing adoption of Ethereum-based solutions in Europe, the vulnerability could affect critical financial infrastructure and emerging blockchain ecosystems.

Mitigation Recommendations

1. Upgrade all go-ethereum nodes to version 1.10.17 or later, which contains the official patch addressing this vulnerability. 2. If immediate upgrade is not feasible, reduce the logging verbosity level to INFO or lower to prevent exploitation via high verbosity logging. 3. Restrict network exposure of Ethereum nodes by implementing firewall rules or network segmentation to limit access to trusted peers only, reducing the attack surface. 4. Monitor node logs and network traffic for unusual p2p message patterns or repeated connection attempts that could indicate exploitation attempts. 5. Employ rate limiting on incoming p2p messages where possible to mitigate resource exhaustion attacks. 6. For organizations running critical infrastructure, consider deploying redundant nodes and failover mechanisms to maintain availability in case of node crashes. 7. Regularly audit node configurations and update operational security policies to ensure logging and network settings minimize exposure to such vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-04-13T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf2f48

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 8:36:32 AM

Last updated: 8/16/2025, 6:43:41 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats