Description

nimiq-transaction provides the transaction primitive to be used in Nimiq's Rust implementation. Prior to version 1.3.0, `HistoryTreeProof::verify` panics on a malformed proof where `history.len() != positions.len()` due to `assert_eq!(history.len(), positions.len())`. The proof object is derived from untrusted p2p responses (`ResponseTransactionsProof.proof`) and is therefore attacker-controlled at the network boundary until validated. A malicious peer could trigger a crash by returning a crafted inclusion proof with a length mismatch. The patch for this vulnerability is included as part of v1.3.0. No known workarounds are available.

INFO

Published Date :

2026-04-22T19:52:43.916Z

Last Modified :

2026-04-23T14:17:59.735Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-34067 vulnerability.

Vendors Products
Nimiq
  • Nimiq-transaction
  • Nimiq Proof-of-stake

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact