
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-23492 affects go-libp2p, the official libp2p implementation in the Go programming language. Version 0.18.0 and older versions are vulnerable to targeted resource exhaustion attacks. The vulnerability was disclosed on December 7, 2022, and affects the connection, stream, peer, and memory management components of the software (NVD, GitHub Advisory).
The vulnerability allows attackers to target libp2p's resource management systems. While a connection manager was implemented to keep connections within manageable limits, it was designed for regular peer churn rather than targeted attacks. The vulnerability has a CVSS v3.1 Base Score of 7.5 (HIGH) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating a network-accessible attack requiring no privileges or user interaction (NVD).
An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host's operating system. The attack can be executed continuously, leading to a denial of service, particularly impactful when targeting multiple nodes in a libp2p-based network (GitHub Advisory).
Users are advised to upgrade to go-libp2p version 0.18.1 or newer. For optimal protection, it's recommended to upgrade to v0.21.0 or later, which includes enhanced functionality such as improved metrics around resource usage, Grafana dashboards, allow list support, and default autoscaling limits. While there are no direct workarounds within go-libp2p, some attacks can be mitigated using OS tools like iptables or ufw, or by implementing a load balancer in front of libp2p nodes (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."