<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Nimiq-Keys (&lt;= 0.2.0) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/nimiq-keys--0.2.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 16:32:50 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/nimiq-keys--0.2.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>Nimiq nimiq-keys Ed25519 Signature Length Vulnerability (CVE-2026-40092)</title><link>https://feed.craftedsignal.io/briefs/2026-05-nimiq-keys-dos/</link><pubDate>Fri, 15 May 2026 16:32:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-nimiq-keys-dos/</guid><description>A malicious network peer can crash a Nimiq full node by publishing a crafted Kademlia DHT record due to unchecked Ed25519 signature length in `TaggedPublicKey::verify` (CVE-2026-40092).</description><content:encoded><![CDATA[<p>A remote denial-of-service vulnerability exists within the Nimiq <code>nimiq-keys</code> component, specifically affecting versions 0.2.0 and earlier. This flaw, identified as CVE-2026-40092, allows a malicious actor on the Nimiq network to deliberately crash a full node. The attack involves crafting a Kademlia Distributed Hash Table (DHT) record that contains a <code>TaggedSigned&lt;ValidatorRecord, KeyPair&gt;</code> structure with a malformed signature. Specifically, the signature field must not be exactly 64 bytes in length. The vulnerability lies in the insufficient validation of the signature length within the <code>TaggedPublicKey::verify</code> function, which leads to a panic and node crash. This issue was addressed in version 1.4.0 of the <code>core-rs-albatross</code> library.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious Kademlia DHT record.</li>
<li>The record includes a <code>TaggedSigned&lt;ValidatorRecord, KeyPair&gt;</code> structure.</li>
<li>The signature field within this structure is intentionally set to a length other than 64 bytes.</li>
<li>The attacker publishes this crafted DHT record to the Nimiq network.</li>
<li>A victim Nimiq full node receives the malicious DHT record.</li>
<li>The victim node&rsquo;s DHT verifier processes the record and calls <code>TaggedSigned::verify</code>.</li>
<li>Inside <code>TaggedSigned::verify</code>, the <code>Ed25519Signature::from_bytes(sig).unwrap()</code> function is called.</li>
<li>Because the signature <code>sig</code> is not 64 bytes, <code>ed25519_zebra::Signature::try_from</code> fails, causing <code>unwrap()</code> to panic, crashing the node.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a denial-of-service condition for the targeted Nimiq full node. An attacker can repeatedly trigger this crash, potentially disrupting the Nimiq network&rsquo;s stability. The number of affected nodes depends on the attacker&rsquo;s ability to distribute the crafted DHT records across the network. This could impact the availability of the Nimiq network, making it unavailable for legitimate users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Nimiq <code>core-rs-albatross</code> version 1.4.0 or later, which includes the patch for CVE-2026-40092 (see <a href="https://github.com/nimiq/core-rs-albatross/pull/3708">PR</a> and <a href="https://github.com/nimiq/core-rs-albatross/releases/tag/v1.4.0">v1.4.0</a>).</li>
<li>Implement a network monitoring rule to detect unusual DHT record sizes or malformed signature lengths being propagated across the Nimiq network. While no specific rule is provided, monitoring network traffic for anomalies related to DHT records could provide early warning of exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dos</category><category>nimiq</category><category>signature-validation</category></item></channel></rss>