CVE-2026-22868

Geth's Crypto-Kryptonite: DoS via KZG & ECIES Exhaustion

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 13, 2026·8 min read·9 visits

Executive Summary (TL;DR)

Geth nodes < 1.16.8 are vulnerable to CPU exhaustion. Attackers can spam invalid 'Blob' transactions or malformed P2P handshake packets. The node politely verifies every single piece of garbage data instead of disconnecting the peer, leading to 100% CPU usage and effective denial of service. Update to v1.16.8 immediately.

A high-severity Denial of Service (DoS) vulnerability in Go-ethereum (Geth) allows malicious peers to crash or stall nodes via resource exhaustion. The issue stems from two distinct flaws: failure to fail-fast on invalid KZG proofs (introduced in EIP-4844) and an insufficient length check in ECIES encryption handshakes, causing the CPU to waste cycles on computationally expensive cryptographic verifications for invalid data.

Fix Analysis (1)

Technical Appendix

CVSS Score
7.1/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS Probability
0.12%
Top 100% most exploited
6,000
via Ethernodes.org

Affected Systems

Go-ethereum (Geth) Execution ClientEthereum Mainnet NodesLayer 2 nodes based on Geth (Optimism, Base, etc.)

Affected Versions Detail

Product
Affected Versions
Fixed Version
go-ethereum
ethereum
< 1.16.81.16.8
AttributeDetail
CWE IDCWE-20
Attack VectorNetwork (P2P)
CVSS v4.07.1 (High)
ComponentTxFetcher & ECIES
ImpactDenial of Service (CPU Exhaustion)
Exploit StatusPoC Available
CWE-20
Improper Input Validation

The product receives input or data, but does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Vulnerability Timeline

Fix committed to master branch
2026-01-09
GHSA Advisory Published
2026-01-13
Geth v1.16.8 Released
2026-01-13

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.