Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32314: CWE-248: Uncaught Exception in libp2p rust-yamux

0
High
VulnerabilityCVE-2026-32314cvecve-2026-32314cwe-248
Published: Fri Mar 13 2026 (03/13/2026, 19:53:08 UTC)
Source: CVE Database V5
Vendor/Project: libp2p
Product: rust-yamux

Description

Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. Prior to 0.13.10, the Rust implementation of Yamux can panic when processing a crafted inbound Data frame that sets SYN and uses a body length greater than DEFAULT_CREDIT (e.g. 262145). On the first packet of a new inbound stream, stream state is created and a receiver is queued before oversized-body validation completes. When validation fails, the temporary stream is dropped and cleanup may call remove(...).expect("stream not found"), triggering a panic in the connection state machine. This is remotely reachable over a normal Yamux session and does not require authentication. This vulnerability is fixed in 0.13.10.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/21/2026, 00:39:57 UTC

Technical Analysis

Yamux is a stream multiplexer protocol that manages multiple streams over reliable, ordered connections such as TCP/IP. The Rust implementation of Yamux, used in libp2p, prior to version 0.13.10 contains a vulnerability identified as CVE-2026-32314. The vulnerability arises when processing a specially crafted inbound Data frame that sets the SYN flag and specifies a body length exceeding the DEFAULT_CREDIT threshold (e.g., 262,145 bytes). On receiving the first packet of a new inbound stream, the implementation prematurely creates stream state and queues a receiver before validating the oversized body length. When the validation fails, the temporary stream is dropped, but the cleanup process calls remove(...).expect("stream not found"), which triggers a panic due to the stream being absent from the connection state machine. This uncaught exception causes the connection to crash, resulting in a denial of service. The flaw is remotely exploitable without requiring authentication or user interaction, making it accessible to any attacker able to establish a Yamux session. The vulnerability is classified under CWE-248 (Uncaught Exception) and has a CVSS 4.0 score of 8.7, indicating high severity. The issue is resolved in rust-yamux version 0.13.10. No public exploits are known at this time, but the vulnerability's nature makes it a significant risk for systems relying on libp2p's rust-yamux for multiplexed stream management.

Potential Impact

This vulnerability can lead to denial of service (DoS) by crashing the connection state machine of applications using rust-yamux versions prior to 0.13.10. Since libp2p is widely used in decentralized networks, peer-to-peer applications, blockchain nodes, and distributed systems, exploitation could disrupt communication channels, degrade service availability, and potentially cause cascading failures in dependent services. The lack of authentication requirement and ease of remote exploitation increase the risk of widespread attacks. Organizations relying on libp2p for critical infrastructure, decentralized applications, or blockchain networks could face service interruptions, impacting business continuity and user trust. Additionally, attackers might leverage this DoS to facilitate further attacks by creating network instability or distracting defenders.

Mitigation Recommendations

The primary mitigation is to upgrade rust-yamux to version 0.13.10 or later, where the vulnerability is fixed. Organizations should audit their dependencies to identify usage of vulnerable rust-yamux versions and apply patches promptly. For environments where immediate upgrade is not feasible, implementing network-level controls to restrict or monitor inbound Yamux sessions can reduce exposure. Rate limiting inbound connections and validating incoming frames at the application layer may help detect and block malformed packets attempting to exploit this flaw. Additionally, integrating robust error handling and recovery mechanisms in applications using rust-yamux can mitigate the impact of unexpected panics. Continuous monitoring for unusual connection terminations or crashes related to Yamux streams is recommended to detect exploitation attempts early.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-11T21:16:21.660Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b473bd2f860ef943aa940a

Added to database: 3/13/2026, 8:29:49 PM

Last enriched: 3/21/2026, 12:39:57 AM

Last updated: 4/28/2026, 12:54:58 AM

Views: 133

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses