<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Gossip — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/gossip/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/gossip/feed.xml" rel="self" type="application/rss+xml"/><item><title>Zebra Block Discovery Denial-of-Service via Gossip Queue Saturation and Syncer Poisoning</title><link>https://feed.craftedsignal.io/briefs/2024-01-zebra-block-discovery-dos/</link><pubDate>Tue, 02 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-zebra-block-discovery-dos/</guid><description>A denial-of-service vulnerability exists in Zebra's block discovery pipeline, allowing an unauthenticated remote attacker to permanently halt all new block discovery on a targeted node by exploiting weaknesses in the gossip, syncer, and download subsystems.</description><content:encoded><![CDATA[<p>A composite denial-of-service vulnerability in Zebra&rsquo;s block discovery pipeline allows an unauthenticated remote attacker to permanently halt all new block discovery on a targeted node. This vulnerability, present in Zebra versions prior to 4.4.0, exploits three weaknesses in the gossip, syncer, and download subsystems. The attack is initiated from a single TCP connection, creating a monotonically growing block deficit that never self-heals. This vulnerability allows an attacker to suppress both block discovery paths simultaneously, causing the node to fall permanently behind the chain tip. The discovery of this vulnerability was reported through a coordinated disclosure process by Zebra the researcher.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker establishes a TCP connection to the targeted Zebra node.</li>
<li>Attacker floods the node with a high volume of <code>inv</code> messages containing fake block hashes.</li>
<li>The gossip download queue on the target node becomes saturated due to the lack of per-connection rate limits on <code>inv</code> messages.</li>
<li>Legitimate block announcements from honest peers are dropped without warning, preventing normal block discovery via gossip.</li>
<li>Attacker sends <code>FindBlocks</code> requests to the target node, attempting to trigger the syncer path.</li>
<li>Attacker responds to <code>FindBlocks</code> requests with empty <code>inv</code> messages, degrading the syncer path.</li>
<li>When the target node attempts to download blocks, the attacker responds with <code>NotFound</code> messages.</li>
<li>The target node permanently falls behind the chain tip, requiring operator intervention to recover due to the suppression of both block discovery paths.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a permanent denial-of-service condition. The targeted Zebra node falls behind the chain tip and ceases to discover new blocks, effectively halting its participation in the network. The attack is unauthenticated and requires only a single TCP connection, making it easy to execute. Any Zebra node reachable over the peer-to-peer network is potentially vulnerable. Recovery requires manual intervention by the node operator.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Zebra version 4.4.0 or later to patch CVE-2026-44499, as the fix drops connections that send empty responses to <code>FindBlocks</code> and <code>FindHeaders</code> messages.</li>
<li>Deploy the Sigma rule &ldquo;Detect Zebra Syncer Path Degradation&rdquo; to identify suspicious connections sending empty responses to <code>FindBlocks</code> and <code>FindHeaders</code> messages.</li>
<li>Monitor network connections for excessive <code>inv</code> message traffic from single peers to detect potential gossip queue saturation attacks.</li>
<li>Review firewall logs for unusual connection patterns targeting Zebra nodes, indicative of potential reconnaissance or exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>denial-of-service</category><category>zebra</category><category>block-discovery</category><category>gossip</category><category>syncer</category></item></channel></rss>