Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-52922: n/a

0
Medium
VulnerabilityCVE-2024-52922cvecve-2024-52922
Published: Mon Nov 18 2024 (11/18/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-52922 is a medium severity vulnerability in Bitcoin Core versions prior to 25. 1 where an attacker can cause a node to delay downloading the latest blockchain block. This occurs because a peer announcing a new block may stall instead of following the peer-to-peer protocol, resulting in minutes of delay. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. While it impacts the timeliness of blockchain synchronization, it does not directly compromise confidentiality, integrity, or availability of the node. No known exploits are currently reported in the wild. Organizations running Bitcoin Core nodes should upgrade to version 25. 1 or later to mitigate this issue. Countries with significant Bitcoin network participation and infrastructure are most at risk from potential exploitation.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:40:42 UTC

Technical Analysis

CVE-2024-52922 is a vulnerability identified in Bitcoin Core software versions before 25.1. The flaw arises from a deviation in the peer-to-peer protocol handling where an announcing peer, responsible for informing other nodes about new blocks, can stall instead of properly complying with the protocol specification. This stalling causes the receiving node to experience a delay of several minutes before downloading the latest block. The vulnerability is network exploitable without requiring any privileges or user interaction, as it leverages the normal peer communication channels. The impact is primarily on the timeliness and efficiency of blockchain synchronization, potentially causing nodes to lag behind the current state of the blockchain temporarily. This could affect transaction validation speed and network consensus propagation but does not directly allow data tampering or denial of service. No patches or exploits are detailed in the provided information, but upgrading to Bitcoin Core 25.1 or later is recommended to address this issue. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting a medium severity level due to its network vector and low complexity but limited impact scope.

Potential Impact

The primary impact of CVE-2024-52922 is a delay in blockchain synchronization for affected Bitcoin Core nodes. This delay can cause nodes to temporarily operate on outdated blockchain data, potentially slowing transaction confirmations and consensus propagation. For organizations running Bitcoin infrastructure, such delays could reduce the efficiency and reliability of their services, including wallets, exchanges, and payment processors. While the vulnerability does not allow direct compromise of data integrity or availability, prolonged delays could be exploited in coordinated attacks to degrade network performance or cause temporary forks. The impact is mostly operational and timing-related rather than catastrophic. Since Bitcoin is a globally distributed network, even minor delays can have ripple effects on transaction finality and network trustworthiness if exploited at scale.

Mitigation Recommendations

To mitigate CVE-2024-52922, organizations should upgrade all Bitcoin Core nodes to version 25.1 or later where the protocol compliance issue is resolved. Network operators should monitor peer behavior for anomalies such as stalling or delayed block announcements and consider implementing peer blacklisting or rate limiting for suspicious nodes. Enhancing logging and alerting on block propagation delays can help detect exploitation attempts early. Additionally, running multiple redundant nodes and using diverse peer connections can reduce the impact of any single stalling peer. Operators should also keep abreast of Bitcoin Core release notes and security advisories to apply patches promptly. Finally, educating infrastructure teams about this vulnerability and its operational impact will improve incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-11-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bbcb7ef31ef0b55a7ba

Added to database: 2/25/2026, 9:38:04 PM

Last enriched: 2/26/2026, 1:40:42 AM

Last updated: 2/26/2026, 6:13:09 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats