Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46597: n/a

0
High
VulnerabilityCVE-2025-46597cvecve-2025-46597
Published: Fri Mar 20 2026 (03/20/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Bitcoin Core 0.13.0 through 29.x has an integer overflow.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:18:28 UTC

Technical Analysis

CVE-2025-46597 identifies an integer overflow vulnerability in Bitcoin Core software versions 0.13.0 through 29.x. Integer overflow (CWE-190) occurs when an arithmetic operation attempts to create a numeric value outside the range that can be represented with a given number of bits, causing wraparound or unexpected behavior. In Bitcoin Core, this flaw can be triggered remotely without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts availability (A:H) but does not compromise confidentiality or integrity. This means an attacker can cause Bitcoin nodes to crash or become unresponsive, potentially leading to denial of service (DoS) conditions. Given Bitcoin Core's role as the primary software for validating and relaying transactions on the Bitcoin network, such disruptions can affect network reliability and transaction processing. The vulnerability spans multiple major releases, indicating a long-standing issue. No known exploits have been reported in the wild, and no official patches have been linked yet, suggesting that mitigation relies on monitoring and eventual software updates. The vulnerability's high CVSS score (7.5) reflects its ease of exploitation and significant impact on availability without requiring privileges or user actions.

Potential Impact

The primary impact of CVE-2025-46597 is denial of service against Bitcoin Core nodes, which can lead to network instability and reduced transaction processing capacity. Organizations running Bitcoin infrastructure, including exchanges, wallet providers, and miners, may experience service interruptions, affecting their operations and customer trust. Disrupted nodes may cause delays in transaction validation and propagation, potentially impacting the broader Bitcoin ecosystem. While confidentiality and integrity are not directly affected, availability degradation can indirectly undermine trust in Bitcoin services. The widespread use of Bitcoin Core globally means that this vulnerability could have a broad impact, especially in countries with significant cryptocurrency adoption and infrastructure. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits given the public disclosure.

Mitigation Recommendations

1. Monitor official Bitcoin Core repositories and security advisories for patches addressing CVE-2025-46597 and apply updates promptly once available. 2. Until patches are released, consider deploying network-level protections such as rate limiting and traffic filtering to reduce exposure to malformed inputs that could trigger the overflow. 3. Employ robust monitoring of Bitcoin node health and logs to detect abnormal crashes or restarts indicative of exploitation attempts. 4. Use redundant node deployments and load balancing to maintain service availability even if some nodes are affected. 5. Engage with the Bitcoin Core developer community to understand interim mitigation strategies or backported fixes. 6. Conduct internal code reviews and testing if running customized Bitcoin Core builds to identify and remediate integer overflow risks. 7. Educate operational teams about the vulnerability and establish incident response plans specific to Bitcoin node disruptions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-04-25T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69bd6dade32a4fbe5fa8ba7d

Added to database: 3/20/2026, 3:54:21 PM

Last enriched: 3/27/2026, 7:18:28 PM

Last updated: 4/29/2026, 7:04:17 PM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses