Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31814: CWE-190: Integer Overflow or Wraparound in libp2p rust-yamux

0
High
VulnerabilityCVE-2026-31814cvecve-2026-31814cwe-190
Published: Fri Mar 13 2026 (03/13/2026, 19:19:41 UTC)
Source: CVE Database V5
Vendor/Project: libp2p
Product: rust-yamux

Description

Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. From 0.13.0 to before 0.13.9, a specially crafted WindowUpdate can cause arithmetic overflow in send-window accounting, which triggers a panic in the connection state machine. This is remotely reachable over a normal network connection and does not require authentication. This vulnerability is fixed in 0.13.9.

AI-Powered Analysis

AILast updated: 03/13/2026, 19:44:06 UTC

Technical Analysis

The vulnerability identified as CVE-2026-31814 affects the rust-yamux library, a stream multiplexer component of libp2p that manages multiple logical streams over a single reliable, ordered transport such as TCP/IP. The flaw exists in versions 0.13.0 through 0.13.8 inclusive, where the handling of WindowUpdate frames is flawed. Specifically, a maliciously crafted WindowUpdate can trigger an integer overflow in the send-window accounting logic. This overflow causes the internal arithmetic to wrap around, resulting in an inconsistent state that triggers a panic in the connection state machine. Because rust-yamux is designed to operate over network connections, this vulnerability is remotely exploitable without any authentication or user interaction, making it accessible to unauthenticated attackers. The consequence of exploitation is a denial-of-service condition, as the connection will crash and be unable to continue communication. The vulnerability is classified under CWE-190 (Integer Overflow or Wraparound). The issue was publicly disclosed on March 13, 2026, with a CVSS 4.0 base score of 8.7, indicating high severity. The fix was introduced in rust-yamux version 0.13.9, which corrects the overflow handling to prevent the panic. There are no known exploits in the wild at this time, but the ease of remote exploitation and the critical nature of the component in libp2p-based peer-to-peer networks make this a significant threat vector.

Potential Impact

This vulnerability can cause denial of service on any system using the affected versions of rust-yamux, disrupting peer-to-peer communications that rely on libp2p. Since libp2p is widely used in decentralized networks, blockchain platforms, distributed file systems (e.g., IPFS), and other peer-to-peer applications, exploitation could interrupt critical network operations, degrade service availability, and impact dependent applications. The lack of authentication or user interaction requirements means attackers can trigger the crash remotely, potentially at scale, leading to network instability or targeted service outages. Organizations relying on libp2p for decentralized infrastructure, especially those in blockchain, distributed storage, and real-time communications, may face operational disruptions and potential cascading failures. While the vulnerability does not directly lead to code execution or data leakage, the denial of service impact on network connectivity can have significant operational and financial consequences.

Mitigation Recommendations

The primary mitigation is to upgrade rust-yamux to version 0.13.9 or later, where the integer overflow flaw is fixed. Organizations should audit their dependency trees to identify usage of libp2p components that include rust-yamux and ensure all instances are updated. For environments where immediate upgrade is not feasible, network-level controls such as filtering or rate limiting suspicious WindowUpdate frames may reduce exposure, though this is a partial and less reliable mitigation. Monitoring network traffic for anomalous WindowUpdate messages and implementing connection-level anomaly detection can help identify exploitation attempts. Additionally, incorporating robust error handling and connection restart mechanisms in applications using rust-yamux can minimize service disruption. Vendors and developers should also consider fuzz testing and static analysis on protocol parsers to proactively detect similar integer overflow issues in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-09T16:33:42.914Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b465b22f860ef9438da28d

Added to database: 3/13/2026, 7:29:54 PM

Last enriched: 3/13/2026, 7:44:06 PM

Last updated: 3/13/2026, 8:38:51 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses