PT-2026-41387 · Crates.Io · Nimiq-Keys

Published

2026-05-15

·

Updated

2026-05-15

·

CVE-2026-40092

CVSS v3.1

7.5

High

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact

A malicious network peer can crash any Nimiq full node by publishing a crafted Kademlia DHT record containing a TaggedSigned<ValidatorRecord, KeyPair> with a signature field whose byte length is not exactly 64. When the victim node's DHT verifier calls TaggedSigned::verify, execution reaches Ed25519Signature::from bytes(sig).unwrap() in the TaggedPublicKey implementation for Ed25519PublicKey. The from bytes call fails because ed25519 zebra::Signature::try from rejects slices not 64 bytes, and the unwrap() panics. The BLS TaggedPublicKey implementation correctly returns false on error; only the Ed25519 implementation panics.

Patches

The patch for this vulnerability is formally released as part of v1.4.0.

Workarounds

No known workarounds.

Resources

See PR.

Fix

Unchecked Return Value

Weakness Enumeration

Related Identifiers

CVE-2026-40092
GHSA-27W2-87XV-37C6

Affected Products

Nimiq-Keys