CVE-2026-22862
7.1
Geth Crash Course: CVE-2026-22862
Alon Barad
Software EngineerJan 13, 2026·6 min read·1 visit
PoC Available
Executive Summary (TL;DR)
If you run Geth < 1.16.8, a malicious peer can kill your node instantly with a tiny, malformed encrypted packet. Alternatively, they can flood you with bad math (invalid KZG proofs) to melt your CPU. Update now or enjoy the silence.
A critical Denial of Service vulnerability in go-ethereum (Geth) allows connected peers to crash the node via malformed ECIES messages or exhaust CPU resources through invalid KZG proofs.
Official Patches
Fix Analysis (1)
Technical Appendix
CVSS Score
7.1/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N5,000
Estimated exposed hosts via EtherNodes
Affected Systems
go-ethereum (geth) < 1.16.8
Affected Versions Detail
| Product | Affected Versions | Fixed Version |
|---|---|---|
go-ethereum Ethereum | < 1.16.8 | 1.16.8 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-20 (Improper Input Validation) |
| CVSS Score | 7.1 (High) |
| Attack Vector | Network (P2P) |
| Impact | Denial of Service (Crash or Resource Exhaustion) |
| Exploit Status | PoC Available |
| Language | Go (Golang) |
MITRE ATT&CK Mapping
CWE-20
Improper Input Validation
Improper Input Validation
Known Exploits & Detection
Vulnerability Timeline
Patch committed to master
2026-01-09
CVE Published / Release v1.16.8
2026-01-13
Subscribe to updates
Get the latest CVE analysis reports delivered to your inbox.