Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-52922: n/a

0
Medium
VulnerabilityCVE-2024-52922cvecve-2024-52922
Published: Mon Nov 18 2024 (11/18/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In Bitcoin Core before 25.1, an attacker can cause a node to not download the latest block, because there can be minutes of delay when an announcing peer stalls instead of complying with the peer-to-peer protocol specification.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 01:40:42 UTC

Technical Analysis

CVE-2024-52922 is a vulnerability identified in Bitcoin Core software versions before 25.1. The flaw arises from a deviation in the peer-to-peer protocol handling where an announcing peer, responsible for informing other nodes about new blocks, can stall instead of properly complying with the protocol specification. This stalling causes the receiving node to experience a delay of several minutes before downloading the latest block. The vulnerability is network exploitable without requiring any privileges or user interaction, as it leverages the normal peer communication channels. The impact is primarily on the timeliness and efficiency of blockchain synchronization, potentially causing nodes to lag behind the current state of the blockchain temporarily. This could affect transaction validation speed and network consensus propagation but does not directly allow data tampering or denial of service. No patches or exploits are detailed in the provided information, but upgrading to Bitcoin Core 25.1 or later is recommended to address this issue. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting a medium severity level due to its network vector and low complexity but limited impact scope.

Potential Impact

The primary impact of CVE-2024-52922 is a delay in blockchain synchronization for affected Bitcoin Core nodes. This delay can cause nodes to temporarily operate on outdated blockchain data, potentially slowing transaction confirmations and consensus propagation. For organizations running Bitcoin infrastructure, such delays could reduce the efficiency and reliability of their services, including wallets, exchanges, and payment processors. While the vulnerability does not allow direct compromise of data integrity or availability, prolonged delays could be exploited in coordinated attacks to degrade network performance or cause temporary forks. The impact is mostly operational and timing-related rather than catastrophic. Since Bitcoin is a globally distributed network, even minor delays can have ripple effects on transaction finality and network trustworthiness if exploited at scale.

Mitigation Recommendations

To mitigate CVE-2024-52922, organizations should upgrade all Bitcoin Core nodes to version 25.1 or later where the protocol compliance issue is resolved. Network operators should monitor peer behavior for anomalies such as stalling or delayed block announcements and consider implementing peer blacklisting or rate limiting for suspicious nodes. Enhancing logging and alerting on block propagation delays can help detect exploitation attempts early. Additionally, running multiple redundant nodes and using diverse peer connections can reduce the impact of any single stalling peer. Operators should also keep abreast of Bitcoin Core release notes and security advisories to apply patches promptly. Finally, educating infrastructure teams about this vulnerability and its operational impact will improve incident response readiness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-11-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bbcb7ef31ef0b55a7ba

Added to database: 2/25/2026, 9:38:04 PM

Last enriched: 2/26/2026, 1:40:42 AM

Last updated: 4/12/2026, 9:21:47 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses