Zebra Block Discovery Denial-of-Service via Gossip Queue Saturation and Syncer Poisoning
A denial-of-service vulnerability exists in Zebra's block discovery pipeline, allowing an unauthenticated remote attacker to permanently halt all new block discovery on a targeted node by exploiting weaknesses in the gossip, syncer, and download subsystems.
A composite denial-of-service vulnerability in Zebra’s block discovery pipeline allows an unauthenticated remote attacker to permanently halt all new block discovery on a targeted node. This vulnerability, present in Zebra versions prior to 4.4.0, exploits three weaknesses in the gossip, syncer, and download subsystems. The attack is initiated from a single TCP connection, creating a monotonically growing block deficit that never self-heals. This vulnerability allows an attacker to suppress both block discovery paths simultaneously, causing the node to fall permanently behind the chain tip. The discovery of this vulnerability was reported through a coordinated disclosure process by Zebra the researcher.
Attack Chain
- Attacker establishes a TCP connection to the targeted Zebra node.
- Attacker floods the node with a high volume of
invmessages containing fake block hashes. - The gossip download queue on the target node becomes saturated due to the lack of per-connection rate limits on
invmessages. - Legitimate block announcements from honest peers are dropped without warning, preventing normal block discovery via gossip.
- Attacker sends
FindBlocksrequests to the target node, attempting to trigger the syncer path. - Attacker responds to
FindBlocksrequests with emptyinvmessages, degrading the syncer path. - When the target node attempts to download blocks, the attacker responds with
NotFoundmessages. - The target node permanently falls behind the chain tip, requiring operator intervention to recover due to the suppression of both block discovery paths.
Impact
Successful exploitation of this vulnerability results in a permanent denial-of-service condition. The targeted Zebra node falls behind the chain tip and ceases to discover new blocks, effectively halting its participation in the network. The attack is unauthenticated and requires only a single TCP connection, making it easy to execute. Any Zebra node reachable over the peer-to-peer network is potentially vulnerable. Recovery requires manual intervention by the node operator.
Recommendation
- Upgrade to Zebra version 4.4.0 or later to patch CVE-2026-44499, as the fix drops connections that send empty responses to
FindBlocksandFindHeadersmessages. - Deploy the Sigma rule “Detect Zebra Syncer Path Degradation” to identify suspicious connections sending empty responses to
FindBlocksandFindHeadersmessages. - Monitor network connections for excessive
invmessage traffic from single peers to detect potential gossip queue saturation attacks. - Review firewall logs for unusual connection patterns targeting Zebra nodes, indicative of potential reconnaissance or exploitation attempts.
Detection coverage 2
Detect Zebra Syncer Path Degradation
mediumDetects connections sending empty responses to FindBlocks or FindHeaders messages, indicating syncer path degradation attempts.
Detect Excessive inv Message Traffic
lowDetects a single peer sending an excessive number of inv messages, potentially indicating a gossip queue saturation attack.
Detection queries are available on the platform. Get full rules →