CVE-2026-26313: CWE-770: Allocation of Resources Without Limits or Throttling in ethereum go-ethereum
CVE-2026-26313 is a medium-severity vulnerability in go-ethereum (geth) versions prior to 1. 17. 0, where an attacker can cause high memory usage by sending specially crafted peer-to-peer (p2p) messages. This issue stems from allocation of resources without proper limits or throttling (CWE-770), potentially leading to denial of service conditions. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The flaw has been fixed in version 1. 17. 0 of go-ethereum. While no known exploits are currently reported in the wild, organizations running vulnerable versions should prioritize patching to prevent potential service disruption. The impact primarily affects Ethereum nodes running geth, which are critical infrastructure components in blockchain networks.
AI Analysis
Technical Summary
CVE-2026-26313 is a vulnerability identified in the go-ethereum (geth) client, a widely used Golang implementation of the Ethereum protocol's execution layer. The flaw is categorized under CWE-770, which involves allocation of resources without limits or throttling. Specifically, in versions prior to 1.17.0, an attacker can send specially crafted peer-to-peer (p2p) messages to a vulnerable node, causing it to allocate excessive memory. This uncontrolled resource consumption can degrade node performance or cause crashes, effectively resulting in a denial of service (DoS). The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS v4.0 score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, and no privileges or user interaction needed, but limited impact on confidentiality, integrity, and availability. The issue was resolved in the 1.17.0 release of go-ethereum by introducing proper resource allocation limits and throttling mechanisms to prevent memory exhaustion. No public exploits have been reported yet, but the vulnerability poses a risk to Ethereum nodes that are critical for blockchain validation and transaction processing.
Potential Impact
The primary impact of this vulnerability is a denial of service condition on Ethereum nodes running vulnerable versions of go-ethereum. By causing high memory usage, an attacker can degrade node performance, cause crashes, or force restarts, disrupting blockchain operations. This can affect the reliability and availability of Ethereum network services, including decentralized finance (DeFi) applications, smart contracts, and transaction validation. Organizations relying on Ethereum infrastructure, such as exchanges, wallet providers, and blockchain service platforms, may experience service interruptions or degraded user experience. Additionally, widespread exploitation could impact the overall stability of the Ethereum network, potentially undermining trust and causing financial losses. Since the vulnerability does not affect confidentiality or integrity directly, the main concern is availability and operational continuity.
Mitigation Recommendations
1. Upgrade all go-ethereum (geth) nodes to version 1.17.0 or later, where the vulnerability is patched. 2. Implement network-level controls such as firewall rules or rate limiting to restrict and monitor incoming p2p traffic, especially from untrusted or unknown peers. 3. Deploy resource monitoring and alerting on Ethereum nodes to detect abnormal memory usage patterns indicative of exploitation attempts. 4. Consider isolating critical Ethereum nodes within protected network segments to reduce exposure to potentially malicious p2p messages. 5. Regularly audit and update Ethereum client software to incorporate security patches promptly. 6. Participate in Ethereum network best practices and community advisories to stay informed about emerging threats and mitigation strategies.
Affected Countries
United States, Germany, China, South Korea, Japan, United Kingdom, Singapore, Switzerland, Canada, Netherlands
CVE-2026-26313: CWE-770: Allocation of Resources Without Limits or Throttling in ethereum go-ethereum
Description
CVE-2026-26313 is a medium-severity vulnerability in go-ethereum (geth) versions prior to 1. 17. 0, where an attacker can cause high memory usage by sending specially crafted peer-to-peer (p2p) messages. This issue stems from allocation of resources without proper limits or throttling (CWE-770), potentially leading to denial of service conditions. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The flaw has been fixed in version 1. 17. 0 of go-ethereum. While no known exploits are currently reported in the wild, organizations running vulnerable versions should prioritize patching to prevent potential service disruption. The impact primarily affects Ethereum nodes running geth, which are critical infrastructure components in blockchain networks.
AI-Powered Analysis
Technical Analysis
CVE-2026-26313 is a vulnerability identified in the go-ethereum (geth) client, a widely used Golang implementation of the Ethereum protocol's execution layer. The flaw is categorized under CWE-770, which involves allocation of resources without limits or throttling. Specifically, in versions prior to 1.17.0, an attacker can send specially crafted peer-to-peer (p2p) messages to a vulnerable node, causing it to allocate excessive memory. This uncontrolled resource consumption can degrade node performance or cause crashes, effectively resulting in a denial of service (DoS). The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS v4.0 score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, and no privileges or user interaction needed, but limited impact on confidentiality, integrity, and availability. The issue was resolved in the 1.17.0 release of go-ethereum by introducing proper resource allocation limits and throttling mechanisms to prevent memory exhaustion. No public exploits have been reported yet, but the vulnerability poses a risk to Ethereum nodes that are critical for blockchain validation and transaction processing.
Potential Impact
The primary impact of this vulnerability is a denial of service condition on Ethereum nodes running vulnerable versions of go-ethereum. By causing high memory usage, an attacker can degrade node performance, cause crashes, or force restarts, disrupting blockchain operations. This can affect the reliability and availability of Ethereum network services, including decentralized finance (DeFi) applications, smart contracts, and transaction validation. Organizations relying on Ethereum infrastructure, such as exchanges, wallet providers, and blockchain service platforms, may experience service interruptions or degraded user experience. Additionally, widespread exploitation could impact the overall stability of the Ethereum network, potentially undermining trust and causing financial losses. Since the vulnerability does not affect confidentiality or integrity directly, the main concern is availability and operational continuity.
Mitigation Recommendations
1. Upgrade all go-ethereum (geth) nodes to version 1.17.0 or later, where the vulnerability is patched. 2. Implement network-level controls such as firewall rules or rate limiting to restrict and monitor incoming p2p traffic, especially from untrusted or unknown peers. 3. Deploy resource monitoring and alerting on Ethereum nodes to detect abnormal memory usage patterns indicative of exploitation attempts. 4. Consider isolating critical Ethereum nodes within protected network segments to reduce exposure to potentially malicious p2p messages. 5. Regularly audit and update Ethereum client software to incorporate security patches promptly. 6. Participate in Ethereum network best practices and community advisories to stay informed about emerging threats and mitigation strategies.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-13T16:27:51.807Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69977dd1d7880ec89b33bbe6
Added to database: 2/19/2026, 9:17:05 PM
Last enriched: 2/19/2026, 9:31:46 PM
Last updated: 2/19/2026, 11:21:24 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-26958: CWE-665: Improper Initialization in FiloSottile filippo.io/edwards25519
LowCVE-2026-26953: CWE-20: Improper Input Validation in pi-hole web
MediumCVE-2026-2605: Insertion of Sensitive Information into Log File in Tanium TanOS
MediumCVE-2026-2435: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Tanium Asset
MediumCVE-2026-2408: Use After Free in Tanium Cloud Workloads
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.