CVE-2025-54604

Core · Core Multiple Products

A high-severity vulnerability has been identified in multiple versions of Bitcoin Core software, which could allow a remote attacker to cause a denial-of-service condition.

Executive summary

A high-severity vulnerability has been identified in multiple versions of Bitcoin Core software, which could allow a remote attacker to cause a denial-of-service condition. Successful exploitation could crash the node, disrupting its ability to process transactions and participate in the network, leading to service downtime for any dependent business operations. Organizations are urged to apply the vendor-provided security updates immediately to mitigate this risk.

Vulnerability

A remote, unauthenticated attacker can send a specially crafted peer-to-peer (P2P) network message to a vulnerable Bitcoin Core node. The vulnerability exists due to improper input validation within the P2P message handling component. This flaw allows an attacker to trigger a buffer overflow, which causes the node's daemon process to crash, resulting in a complete denial-of-service (DoS). Exploitation does not require any user interaction or prior authentication; the attacker only needs network access to the target node's P2P port.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.5, reflecting its potential for significant disruption with low attack complexity. A successful exploit would render the Bitcoin node unresponsive, halting its ability to process transactions, validate blocks, and maintain synchronization with the broader network. For organizations such as cryptocurrency exchanges, payment processors, wallet services, or mining operations that depend on node uptime for their core functions, this vulnerability poses a direct risk of service outages, financial losses, and reputational damage.

Remediation

Immediate Action: Apply the security updates provided by the vendor to all affected Bitcoin Core nodes without delay. After patching, monitor node stability and review system and application logs for any signs of crashes or anomalous behavior that may indicate prior or ongoing exploitation attempts.

Proactive Monitoring: System administrators should actively monitor node logs for unexpected shutdown events, segmentation faults, or error messages related to P2P message processing. Monitor network traffic for unusual patterns or connections from untrusted IP addresses attempting to communicate on the P2P port. Abnormally high CPU or memory usage preceding a crash could also be an indicator of an exploitation attempt.

Compensating Controls: If immediate patching is not feasible, implement strict firewall rules to limit inbound P2P connections to a pre-approved list of known, trusted peers. Deploying a network-based Intrusion Detection System (IDS) or Intrusion Prevention System (IPS) with signatures to detect and block malformed P2P traffic can also serve as a temporary mitigating control.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 7.5) of this vulnerability and its direct impact on service availability, we strongly recommend that all organizations running affected versions of Bitcoin Core prioritize the immediate deployment of vendor-supplied patches. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its potential for widespread disruption makes it a prime target for attackers. Organizations should treat this as a critical priority and complete remediation actions to prevent operational downtime and potential financial impact.