CVE-2022-23486

libp2p-rust denial of service vulnerability from lack of resource management

Description

libp2p-rust is the official rust language Implementation of the libp2p networking stack. In versions prior to 0.45.1 an attacker node can cause a victim node to allocate a large number of small memory chunks, which can ultimately lead to the victim’s process running out of memory and thus getting killed by its operating system. When executed continuously, this can lead to a denial of service attack, especially relevant on a larger scale when run against more than one node of a libp2p based network. Users are advised to upgrade to `libp2p` `v0.45.1` or above. Users unable to upgrade should reference the DoS Mitigation page for more information on how to incorporate mitigation strategies, monitor their application, and respond to attacks: https://docs.libp2p.io/reference/dos-mitigation/.

Categories

7.5
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.07%
Third-Party Advisory github.com
Affected: libp2p rust-libp2p
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-23486?
CVE-2022-23486 has been scored as a high severity vulnerability.
How to fix CVE-2022-23486?
To fix CVE-2022-23486, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2022-23486 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-23486 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-23486?
CVE-2022-23486 affects libp2p rust-libp2p.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.