Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47270: CWE-400: Uncontrolled Resource Consumption in nimiq core-rs-albatross

0
High
VulnerabilityCVE-2025-47270cvecve-2025-47270cwe-400
Published: Mon May 12 2025 (05/12/2025, 10:47:44 UTC)
Source: CVE
Vendor/Project: nimiq
Product: core-rs-albatross

Description

CVE-2025-47270 is a high-severity Denial of Service (DoS) vulnerability in the nimiq/core-rs-albatross Rust implementation of the Nimiq Proof-of-Stake protocol. The vulnerability arises from uncontrolled memory allocation in the nimiq-network-libp2p subcrate's Discovery message handling, where a peer can specify a length value up to 4 GB, causing excessive memory consumption and node crashes. This flaw allows remote attackers to repeatedly trigger DoS without authentication or user interaction. The vulnerability affects versions prior to 1. 1. 0, where the patch introduces a 1 MB limit on message size and incremental buffer resizing. No known exploits are currently reported in the wild. European organizations running nodes with vulnerable versions are at risk of service disruption, especially those involved in blockchain or cryptocurrency infrastructure. Mitigation requires prompt upgrade to version 1. 1.

AI-Powered Analysis

AILast updated: 02/07/2026, 08:06:37 UTC

Technical Analysis

CVE-2025-47270 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) found in the nimiq/core-rs-albatross project, a Rust-based implementation of the Nimiq Proof-of-Stake blockchain protocol utilizing the Albatross consensus algorithm. The vulnerability exists in the nimiq-network-libp2p subcrate, specifically in the handling of Discovery network messages used for peer discovery. The implementation allocates memory buffers based on a length value provided by a peer without enforcing an upper bound. Since the length is a 32-bit unsigned integer (u32), an attacker can specify a length up to 4 GB, forcing the node to allocate excessive memory. This uncontrolled allocation can lead to memory exhaustion, causing the node to crash or become unresponsive, effectively resulting in a Denial of Service (DoS). Discovery messages are exchanged regularly, allowing repeated exploitation to maintain the DoS condition. The vulnerability requires no authentication or user interaction, making it remotely exploitable by any peer on the network. The vendor released a patch in version 1.1.0 that limits the maximum Discovery message size to 1 MB and implements incremental buffer resizing to prevent large allocations. No workarounds are available, and no known exploits have been reported in the wild as of the publication date.

Potential Impact

The primary impact of CVE-2025-47270 is Denial of Service, which can disrupt the availability of nodes running the vulnerable nimiq/core-rs-albatross versions. For European organizations operating blockchain nodes or infrastructure relying on the Nimiq protocol, this can lead to service outages, loss of network participation, and potential financial or reputational damage. Since the vulnerability allows remote exploitation without authentication, attackers can easily target exposed nodes to cause crashes or instability. This may also affect the resilience and reliability of blockchain networks in Europe, potentially undermining trust in services built on Nimiq. Organizations providing blockchain-based financial services, exchanges, or decentralized applications using Nimiq are particularly at risk. The repeated nature of the attack could also increase operational costs due to recovery efforts and monitoring. Although no data confidentiality or integrity impact is reported, the availability impact alone is significant for critical blockchain infrastructure.

Mitigation Recommendations

To mitigate CVE-2025-47270, European organizations should immediately upgrade all instances of nimiq/core-rs-albatross to version 1.1.0 or later, where the vulnerability is patched. This update enforces a 1 MB limit on Discovery message sizes and uses incremental buffer resizing to prevent excessive memory allocation. Network administrators should restrict access to Nimiq nodes to trusted peers where possible, using network segmentation and firewall rules to limit exposure to untrusted or unknown nodes. Monitoring and alerting should be enhanced to detect abnormal memory usage or frequent node restarts indicative of exploitation attempts. Organizations should also review their incident response plans to handle potential DoS attacks targeting blockchain infrastructure. Since no workarounds exist, patching remains the primary defense. Additionally, participation in Nimiq community channels and security advisories is recommended to stay informed about any emerging exploits or further mitigations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-05-05T16:53:10.372Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd7162

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 2/7/2026, 8:06:37 AM

Last updated: 2/7/2026, 12:29:31 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats