PatchSiren cyber security CVE debrief
CVE-2026-40092 nimiq CVE debrief
CVE-2026-40092 is a denial-of-service vulnerability in Nimiq’s Rust blockchain implementation. In affected versions, a remote peer can send a crafted Kademlia DHT record that causes a full node to panic during signature verification, crashing the process. The issue is fixed in v1.4.0.
- Vendor
- nimiq
- Product
- core-rs-albatross
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-20
- Original CVE updated
- 2026-05-21
- Advisory published
- 2026-05-20
- Advisory updated
- 2026-05-21
Who should care
Operators and maintainers of Nimiq full nodes, especially deployments running nimiq-blockchain 1.3.0 or earlier and any service that depends on node availability.
Technical summary
The vulnerability is triggered during DHT record verification. A maliciously crafted TaggedSigned<ValidatorRecord, KeyPair> can supply an Ed25519 signature byte slice whose length is not exactly 64 bytes. When TaggedSigned::verify reaches Ed25519Signature::from_bytes(sig).unwrap() in the Ed25519 TaggedPublicKey implementation, ed25519_zebra::Signature::try_from rejects the malformed slice, from_bytes fails, and the unwrap panics. The BLS TaggedPublicKey path handles the error by returning false, so the crash is specific to the Ed25519 implementation.
Defensive priority
High. This is an unauthenticated, network-reachable availability issue with a straightforward crash condition and no user interaction required.
Recommended defensive actions
- Upgrade nimiq-blockchain to version 1.4.0 or later.
- Prioritize patching exposed full nodes and any infrastructure that directly processes untrusted DHT traffic.
- If immediate upgrading is not possible, reduce exposure of vulnerable nodes to untrusted peers where operationally feasible.
- Monitor for unexpected process exits or crash loops on affected nodes until remediation is complete.
Evidence notes
The CVE record and NVD entry identify the issue as a network-triggered availability problem with CVSS 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The GitHub advisory, fix commit, pull request, and v1.4.0 release are the supplied references supporting the affected/fixed version range and remediation path.
Official resources
Publicly disclosed on 2026-05-20, with the issue fixed in v1.4.0 and documented in the linked GitHub advisory and NVD record.