Vulnerability Description
Nimiq's network-libp2p is a Nimiq network implementation based on libp2p. Prior to version 1.3.0, `network-libp2p` discovery uses a libp2p `ConnectionHandler` state machine. the handler assumes there is at most one inbound and one outbound discovery substream per connection. if a remote peer opens/negotiate the discovery protocol substream a second time on the same connection, the handler hits a `panic!(\"Inbound already connected\")` / `panic!(\"Outbound already connected\")` path instead of failing closed. This causes a remote crash of the networking task (swarm), taking the node's p2p networking offline until restart. The patch for this vulnerability is formally released as part of v1.3.0. No known workarounds are available.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nimiq | Nimiq Proof-Of-Stake | < 1.3.0 |
Related Weaknesses (CWE)
References
- https://github.com/nimiq/core-rs-albatross/commit/e0d4e01994f061bf41d3c2835bc740Patch
- https://github.com/nimiq/core-rs-albatross/pull/3666Issue TrackingPatch
- https://github.com/nimiq/core-rs-albatross/releases/tag/v1.3.0Release Notes
- https://github.com/nimiq/core-rs-albatross/security/advisories/GHSA-74hp-mhfx-m4PatchVendor Advisory
FAQ
What is CVE-2026-34063?
CVE-2026-34063 is a vulnerability with a CVSS score of 7.5 (HIGH). Nimiq's network-libp2p is a Nimiq network implementation based on libp2p. Prior to version 1.3.0, `network-libp2p` discovery uses a libp2p `ConnectionHandler` state machine. the handler assumes there ...
How severe is CVE-2026-34063?
CVE-2026-34063 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-34063?
Check the references section above for vendor advisories and patch information. Affected products include: Nimiq Nimiq Proof-Of-Stake.