CVE-2026-40092: Nimiq Blockchain Node Crash Vulnerability
The National Vulnerability Database has detailed CVE-2026-40092, affecting Nimiq’s Rust implementation for its blockchain. Specifically, versions 1.3.0 and below of nimiq-blockchain are vulnerable. A high-severity flaw (CVSS 7.5) allows a malicious network peer to crash any Nimiq full node by publishing a specially crafted Kademlia DHT record. The attack vector is straightforward: an attacker sends a TaggedSigned<ValidatorRecord, KeyPair> with a signature field that isn’t exactly 64 bytes long.
The vulnerability lies within the Ed25519 TaggedPublicKey implementation. When the victim node’s DHT verifier processes this malformed record, the Ed25519Signature::from_bytes(sig).unwrap() call panics because ed25519_zebra::Signature::try_from rejects byte slices not precisely 64 bytes. While the BLS TaggedPublicKey implementation correctly handles such errors by returning false, the Ed25519 implementation catastrophically fails. This means an attacker can achieve a denial of service with minimal effort, disrupting network operations.
The fix is available in version 1.4.0 of nimiq-blockchain. This isn’t some theoretical flaw; it’s a direct path to take down a full node. For any blockchain project, node stability is paramount. This type of vulnerability can be exploited for network disruption or to facilitate other attacks by weakening the network’s integrity and availability.
What This Means For You
- If your organization operates Nimiq full nodes using the Rust implementation, you are exposed to a denial-of-service attack. Immediately verify your `nimiq-blockchain` version. Patch to version 1.4.0 or higher without delay. This is a critical stability issue that an attacker can exploit with a single malformed packet.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-40092: Nimiq Node Crash via Malformed Kademlia DHT Record
title: CVE-2026-40092: Nimiq Node Crash via Malformed Kademlia DHT Record
id: scw-2026-05-20-ai-1
status: experimental
level: high
description: |
Detects the execution of the Nimiq node process with command line arguments indicating DHT interaction, which is the vector for CVE-2026-40092. This rule aims to identify potential exploitation attempts where a crafted Kademlia DHT record is published to crash the node.
author: SCW Feed Engine (AI-generated)
date: 2026-05-20
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-40092/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: process_creation
detection:
selection:
Image|endswith:
- 'nimiq-node'
CommandLine|contains:
- 'dht'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-40092 | DoS | nimiq-blockchain versions 1.3.0 and below |
| CVE-2026-40092 | DoS | Crafted Kademlia DHT record with TaggedSigned |
| CVE-2026-40092 | DoS | Vulnerable function: TaggedSigned::verify leading to Ed25519Signature::from_bytes(sig).unwrap() in TaggedPublicKey implementation for Ed25519PublicKey |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 21, 2026 at 01:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.