Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-35202: n/a

0
High
VulnerabilityCVE-2024-35202cvecve-2024-35202
Published: Thu Oct 10 2024 (10/10/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-35202 is a high-severity denial of service vulnerability in Bitcoin Core versions before 25. 0. It allows remote attackers to crash nodes by sending a specially crafted blocktxn message containing transactions not committed in the block's merkle root. This triggers an assertion failure during blocktxn message handling, causing the node to exit unexpectedly. The flaw arises because the FillBlock function can be called twice on the same PartiallyDownloadedBlock instance, leading to inconsistent state and a crash. No authentication or user interaction is required, and exploitation can be performed remotely over the network. Although no known exploits are currently reported in the wild, the impact on node availability is significant. Organizations running Bitcoin Core nodes should prioritize updating to version 25. 0 or later once available. This vulnerability primarily affects entities operating Bitcoin infrastructure globally, especially in countries with high cryptocurrency adoption and mining activity.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:52:08 UTC

Technical Analysis

CVE-2024-35202 is a denial of service vulnerability affecting Bitcoin Core implementations prior to version 25.0. The vulnerability is triggered when a remote attacker sends a blocktxn message containing transactions that are not included in the block's merkle root commitment. Bitcoin Core processes blocktxn messages to download transactions referenced by a block header. However, due to a logic flaw, the FillBlock function can be invoked twice on the same PartiallyDownloadedBlock instance, which leads to an assertion failure during message handling. This assertion failure causes the node process to exit unexpectedly, resulting in a denial of service. The vulnerability does not impact confidentiality or integrity but severely affects availability by crashing nodes. The attack vector is network-based, requiring no privileges or user interaction, making it relatively easy to exploit. The vulnerability is categorized under CWE-770 (Allocation of Resources Without Limits or Throttling), indicating improper handling of resource state leading to instability. No patches or mitigations are linked yet, but upgrading to Bitcoin Core 25.0 or later, which presumably addresses this issue, is recommended. No known exploits have been reported in the wild as of the publication date.

Potential Impact

The primary impact of CVE-2024-35202 is denial of service against Bitcoin Core nodes, which can cause nodes to crash and exit unexpectedly. This disrupts the availability of nodes, potentially affecting the stability and reliability of the Bitcoin network, especially for organizations running critical infrastructure such as exchanges, mining pools, and wallet services. Repeated exploitation could lead to network partitioning or delays in transaction validation and block propagation. While the vulnerability does not compromise transaction integrity or confidentiality, the loss of node availability can degrade trust and operational continuity. Organizations relying on Bitcoin Core for blockchain validation or transaction processing may face service interruptions, impacting financial operations and user trust. The ease of remote exploitation without authentication increases the risk of widespread attacks if the vulnerability is weaponized. However, the absence of known exploits in the wild suggests limited immediate threat but warrants proactive mitigation.

Mitigation Recommendations

To mitigate CVE-2024-35202, organizations should: 1) Upgrade Bitcoin Core to version 25.0 or later as soon as it becomes available, since the vulnerability affects versions prior to 25.0. 2) Implement network-level filtering to restrict incoming connections to trusted peers only, reducing exposure to untrusted actors who could send malicious blocktxn messages. 3) Monitor node logs and metrics for unexpected crashes or assertion failures related to blocktxn message handling to detect potential exploitation attempts. 4) Deploy redundancy and failover mechanisms for critical Bitcoin infrastructure to maintain service availability during node outages. 5) Participate in Bitcoin Core community channels to stay informed about patches, advisories, and best practices related to this vulnerability. 6) Consider running nodes with hardened configurations that limit resource exhaustion and enforce strict validation checks. These steps go beyond generic advice by focusing on both patching and operational controls to reduce attack surface and impact.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c56b7ef31ef0b5631eb

Added to database: 2/25/2026, 9:40:38 PM

Last enriched: 2/26/2026, 4:52:08 AM

Last updated: 2/26/2026, 6:38:49 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats