Nimiq Albatross Vulnerability: Validator Crash via Malformed Proposal

Nimiq Albatross Vulnerability: Validator Crash via Malformed Proposal

The National Vulnerability Database (NVD) has detailed CVE-2026-32605, a high-severity vulnerability impacting nimiq/core-rs-albatross, the Rust implementation of the Nimiq Proof-of-Stake protocol. This flaw, present in versions prior to 1.3.0, allows an untrusted peer to crash a validator simply by publishing a specially crafted Tendermint proposal message.

According to NVD, the issue stems from an insufficient bounds check within the ProposalSender::send function. Specifically, it uses a > operator instead of >= for the signer bounds check. This allows a malicious actor to craft a message where the signer index equals validators.num_validators(). This bypasses the intended check, leading to an out-of-bounds index access when validators.get_validator_by_slot_band(signer) is called, resulting in a panic and subsequent validator crash. Crucially, this can occur before any signature verification runs, making it a low-effort denial-of-service vector. The NVD notes that this has been addressed in version 1.3.0 of the software, urging users to update.

Rated with a CVSS score of 7.5 (HIGH), this vulnerability is categorized under CWE-125 (Out-of-bounds Read) and CWE-193 (Off-by-one Error). The impact is primarily on availability, as an attacker can reliably take down Nimiq validators without needing to authenticate or perform complex attacks. This is a classic example of how a seemingly minor coding oversight can lead to significant operational disruption in distributed systems.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 5 SIEM formats

3 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-32605

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

3 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-32605 DoS nimiq/core-rs-albatross versions prior to 1.3.0
CVE-2026-32605 DoS Vulnerable component: ProposalSender::send function
CVE-2026-32605 DoS Vulnerable condition: signer == validators.num_validators() leading to out-of-bounds panic in validators.get_validator_by_slot_band(signer)

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs