Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2gjw-fg97-vg3r | Go Ethereum affected by DoS via malicious p2p message |
Mon, 23 Feb 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ethereum:go_ethereum:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 20 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ethereum
Ethereum go Ethereum |
|
| Vendors & Products |
Ethereum
Ethereum go Ethereum |
Thu, 19 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. Prior to version 1.16.9, a vulnerable node can be forced to shutdown/crash using a specially crafted message. The problem is resolved in the v1.16.9 and v1.17.0 releases of Geth. | |
| Title | Go Ethereum affected by DoS via malicious p2p message | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-20T15:42:28.197Z
Reserved: 2026-02-13T16:27:51.807Z
Link: CVE-2026-26314
Updated: 2026-02-20T15:32:20.431Z
Status : Analyzed
Published: 2026-02-19T22:16:46.813
Modified: 2026-02-23T18:32:26.913
Link: CVE-2026-26314
No data.
OpenCVE Enrichment
Updated: 2026-04-17T18:00:12Z
Github GHSA