Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-52920: n/a

0
High
VulnerabilityCVE-2024-52920cvecve-2024-52920
Published: Mon Nov 18 2024 (11/18/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-52920 is a high-severity vulnerability in Bitcoin Core versions prior to 0. 20. 0 that allows remote attackers to cause a denial of service by triggering an infinite loop via a malformed GETDATA message. This flaw does not require authentication or user interaction and can be exploited over the network, impacting availability without affecting confidentiality or integrity. No known exploits are currently reported in the wild. The vulnerability is related to CWE-770, which involves allocation of resources without limits or throttling, leading to potential resource exhaustion. Organizations running vulnerable Bitcoin Core nodes are at risk of service disruption. Mitigation involves upgrading to Bitcoin Core 0. 20. 0 or later, or applying patches that address the malformed message handling.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:40:11 UTC

Technical Analysis

CVE-2024-52920 is a denial of service vulnerability affecting Bitcoin Core versions before 0.20.0. The issue arises from improper handling of the GETDATA message, a protocol message used by Bitcoin nodes to request data such as blocks or transactions from peers. A remote attacker can send a specially crafted malformed GETDATA message that causes the node to enter an infinite loop, exhausting CPU resources and effectively causing a denial of service. This vulnerability falls under CWE-770, which concerns the allocation of resources without proper limits or throttling, leading to potential resource exhaustion. The vulnerability can be exploited remotely without any authentication or user interaction, making it relatively easy to trigger. The impact is limited to availability, as the infinite loop does not expose confidential data or allow modification of blockchain data. No known exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on availability. Since Bitcoin Core is widely used by cryptocurrency exchanges, wallet providers, miners, and other infrastructure operators, this vulnerability poses a significant risk to the stability of Bitcoin network nodes that have not been updated. The absence of patch links suggests that users should upgrade to version 0.20.0 or later, where this issue is resolved. Monitoring and filtering malformed GETDATA messages can help mitigate exploitation attempts until patches are applied.

Potential Impact

The primary impact of CVE-2024-52920 is denial of service against Bitcoin Core nodes, which can disrupt the availability of critical cryptocurrency infrastructure. Organizations operating Bitcoin nodes, including exchanges, wallet services, miners, and blockchain analytics firms, may experience node crashes or unresponsiveness, leading to transaction delays, reduced network reliability, and potential financial losses. Disrupted nodes can also affect the overall Bitcoin network's health by reducing the number of active peers and slowing block propagation. Although the vulnerability does not compromise confidentiality or integrity, the availability impact can undermine trust in Bitcoin services and cause operational challenges. Large-scale exploitation could lead to widespread node outages, impacting global Bitcoin transaction processing and related services. The ease of exploitation and lack of required privileges increase the risk of opportunistic attacks by malicious actors or automated scanning tools.

Mitigation Recommendations

1. Upgrade Bitcoin Core nodes to version 0.20.0 or later, where the vulnerability is fixed. 2. If immediate upgrade is not possible, implement network-level filtering to detect and block malformed GETDATA messages that do not conform to protocol specifications. 3. Employ rate limiting on incoming GETDATA requests to prevent resource exhaustion from excessive or malformed messages. 4. Monitor node logs and network traffic for unusual patterns or repeated malformed GETDATA messages indicative of exploitation attempts. 5. Use intrusion detection/prevention systems (IDS/IPS) with signatures tailored to detect this specific malformed message attack. 6. Maintain regular backups and ensure node redundancy to minimize service disruption if a node becomes unresponsive. 7. Participate in Bitcoin community security advisories to stay informed about patches and emerging threats related to Bitcoin Core.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-11-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bbcb7ef31ef0b55a7b2

Added to database: 2/25/2026, 9:38:04 PM

Last enriched: 2/26/2026, 1:40:11 AM

Last updated: 2/26/2026, 8:02:19 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats