CVE-2026-33471

Nimiq · nimiq-block

A logic error in the Nimiq block proof verification process allows attackers to bypass quorum requirements using manipulated BLS signatures.

Executive summary

A critical verification flaw in the Nimiq block implementation allows malicious actors to bypass security protocols through signature index collisions.

Vulnerability

The vulnerability exists in SkipBlockProof::verify, where improper index casting allows multiple out-of-range indices to collide into the same in-range slot, enabling signature multiplication.

Business impact

This flaw undermines the consensus mechanism of the Nimiq implementation. An attacker could potentially validate fraudulent blocks, leading to double-spending or network instability. The CVSS score of 9.6 highlights the extreme risk to the integrity of the blockchain-based system.

Remediation

Immediate Action: Update to Nimiq block version 1.3.0 or later immediately.

Proactive Monitoring: Monitor consensus logs for any anomalous block verification failures or irregularities in validator signature aggregation.

Compensating Controls: No effective workarounds exist; immediate application of the vendor-provided patch is required to maintain network security.

Exploitation status

Public Exploit Available: false

Analyst recommendation

All operators running Nimiq infrastructure must update to version 1.3.0 without delay. The integrity of the consensus mechanism is at stake, and no alternative mitigations can compensate for the underlying logic vulnerability.