Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-689v-6xwf-5jf3 | Go Ethereum affected by DoS via malicious p2p message |
Mon, 23 Feb 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ethereum:go_ethereum:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 20 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ethereum
Ethereum go Ethereum |
|
| Vendors & Products |
Ethereum
Ethereum go Ethereum |
Thu, 19 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. Prior to version 1.17.0, an attacker can cause high memory usage by sending a specially-crafted p2p message. The issue is resolved in the v1.17.0 release. | |
| Title | Go Ethereum affected by DoS via malicious p2p message | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-20T19:53:54.846Z
Reserved: 2026-02-13T16:27:51.807Z
Link: CVE-2026-26313
Updated: 2026-02-20T19:53:49.667Z
Status : Analyzed
Published: 2026-02-19T21:18:31.980
Modified: 2026-02-23T18:41:53.410
Link: CVE-2026-26313
No data.
OpenCVE Enrichment
Updated: 2026-04-17T18:00:12Z
Github GHSA