296,663
Total vulnerabilities in the database
Name: ASA-2025-003: Invalid BitArray handling can lead to network halt
Criticality: High (Considerable Impact; Possible Likelihood per ACMv1.2)
Affected versions: <= v0.38.18
, <= v0.37.15
, and main
development branches
Affected users: Validators, Full nodes, Users
A bug was discovered in CometBFT's handling of BitArray
's that have a mismatch between the BitArray
's expected number of Elems
for the specified number of Bits
. Additional validation was added to prevent processing BitArray
's in this invalid state, as well as guards to prevent panics on BitArray
methods if one of these invalid states is processed.
BitArray
's are present in a number of messages received from peers. When handling these messages, insufficient validation was applied to prevent processing messages the aforementioned invalid state. In the worst case, nodes will gossip messages to peers in an invalid state before processing them themselves, leading to a network halt (instead of only the node receiving the malicious message crashing).
The new CometBFT releases v0.38.19 and v0.37.16 fix this issue.
Unreleased code in the main branch is patched as well.
If a node is able to identify a malicious peer sending these payloads, they can ban the ip address using common tools like iptables
.
This issue was reported by @whoismxuse to the Cosmos Bug Bounty Program on HackerOne on October 6, 2025. If you believe you have found a bug in the Cosmos Stack or would like to contribute to the program by reporting a bug, please see https://hackerone.com/cosmos.
If there are questions about Cosmos security efforts, please reach out to our official communication channel at security@cosmoslabs.io.
A Github Security Advisory for this issue is available in the CometBFT repository. For more information about CometBFT, see https://docs.cometbft.com/.
Software | From | Fixed in |
---|---|---|
![]() |
- | 0.37.16 |
![]() |
0.38.0-alpha.1 | 0.38.19 |