Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-52916: n/a

0
High
VulnerabilityCVE-2024-52916cvecve-2024-52916
Published: Mon Nov 18 2024 (11/18/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Bitcoin Core before 0.15.0 allows a denial of service (OOM kill of a daemon process) via a flood of minimum difficulty headers.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:08:22 UTC

Technical Analysis

CVE-2024-52916 is a denial of service vulnerability identified in Bitcoin Core versions before 0.15.0. The flaw arises from the handling of block headers with minimum difficulty, which an attacker can flood to cause excessive memory consumption in the Bitcoin daemon process. This memory exhaustion leads to an out-of-memory (OOM) kill by the operating system, effectively crashing the node and disrupting its availability. The vulnerability is classified under CWE-770 (Allocation of Resources Without Limits or Throttling), indicating improper resource management. The CVSS v3.1 base score is 7.5, reflecting high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no direct confidentiality or integrity compromise. The attack can be executed remotely by sending a high volume of minimum difficulty headers, exploiting the node's insufficient validation or throttling mechanisms. Although no public exploits have been reported yet, the potential for disruption in Bitcoin network operations is significant, especially for nodes that are critical for transaction validation and blockchain propagation. The vulnerability underscores the importance of resource management in blockchain node software to prevent denial of service conditions caused by malformed or malicious network traffic.

Potential Impact

The primary impact of CVE-2024-52916 is the denial of service of Bitcoin Core nodes, which can lead to temporary unavailability of affected nodes. This disruption can degrade the overall resilience and decentralization of the Bitcoin network by reducing the number of active validating nodes. For organizations relying on Bitcoin Core for transaction processing, wallet services, or mining operations, this can result in service interruptions, delayed transaction confirmations, and potential financial losses. The vulnerability does not compromise the confidentiality or integrity of blockchain data but can indirectly affect trust and operational continuity. Large-scale exploitation could cause network instability, especially if many nodes are running vulnerable versions. The ease of exploitation and lack of required privileges increase the risk of widespread attacks, particularly targeting nodes with public network exposure. This can also impact exchanges, payment processors, and other financial services dependent on Bitcoin Core infrastructure.

Mitigation Recommendations

To mitigate CVE-2024-52916, organizations should upgrade all Bitcoin Core nodes to version 0.15.0 or later, where the vulnerability has been addressed. In addition to patching, network-level controls can help reduce exposure by limiting incoming connections to trusted peers and implementing rate limiting on header messages to prevent flooding. Monitoring node resource usage and network traffic patterns can provide early detection of abnormal header floods. Deploying intrusion detection systems (IDS) with signatures or heuristics for unusual Bitcoin header traffic can aid in identifying exploitation attempts. For critical infrastructure, consider running nodes in isolated environments with resource limits to contain potential memory exhaustion. Regularly auditing and updating node software and dependencies is essential to maintain security posture. Finally, educating operational teams about this vulnerability and its impact will help ensure timely response and remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-11-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bbab7ef31ef0b55a702

Added to database: 2/25/2026, 9:38:02 PM

Last enriched: 2/28/2026, 3:08:22 AM

Last updated: 4/12/2026, 1:52:55 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses