Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mq3p-rrmp-79jg | go-ethereum is vulnerable to high CPU usage leading to DoS via malicious p2p message |
Thu, 29 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ethereum:go_ethereum:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ethereum
Ethereum go Ethereum |
|
| Vendors & Products |
Ethereum
Ethereum go Ethereum |
Tue, 13 Jan 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node can be forced to shutdown/crash using a specially crafted message. This vulnerability is fixed in 1.16.8. | |
| Title | go-ethereum has a DoS via malicious p2p message | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-14T23:26:09.865Z
Reserved: 2026-01-12T16:20:16.747Z
Link: CVE-2026-22868
No data.
Status : Analyzed
Published: 2026-01-13T21:15:54.770
Modified: 2026-01-29T18:04:50.100
Link: CVE-2026-22868
No data.
OpenCVE Enrichment
Updated: 2026-04-18T06:30:25Z
Github GHSA