Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-35405

CVE-2026-35405: libp2p-rust DoS Vulnerability

CVE-2026-35405 is a denial of service flaw in libp2p-rust that allows attackers to exhaust server memory through unlimited namespace registrations. This article covers technical details, affected versions, and mitigation.

Published: April 10, 2026

CVE-2026-35405 Overview

CVE-2026-35405 is a resource exhaustion vulnerability in libp2p-rust, the official Rust language implementation of the libp2p networking stack. Prior to version 0.17.1, the libp2p-rendezvous server component lacks any limit on the number of namespaces a single peer can register. This missing allocation limit allows malicious actors to exhaust server memory by continuously registering unique namespaces, ultimately causing an out-of-memory (OOM) condition that terminates the server process.

Critical Impact

Unauthenticated remote attackers can cause denial of service by exhausting server memory through unlimited namespace registrations, potentially disrupting entire libp2p-based decentralized networks.

Affected Products

  • libp2p-rust versions prior to 0.17.1
  • libp2p-rendezvous server component
  • Applications built on vulnerable libp2p-rust versions

Discovery Timeline

  • 2026-04-07 - CVE CVE-2026-35405 published to NVD
  • 2026-04-09 - Last updated in NVD database

Technical Details for CVE-2026-35405

Vulnerability Analysis

This vulnerability falls under CWE-770 (Allocation of Resources Without Limits or Throttling). The libp2p-rendezvous server is designed to facilitate peer discovery in decentralized networks by allowing peers to register under namespaces. However, the implementation prior to version 0.17.1 fails to enforce any restrictions on namespace registration, creating a critical resource exhaustion vector.

When a peer connects to the rendezvous server, it can register itself under arbitrary namespaces without any rate limiting or quota enforcement. The server allocates memory for each registration without any pushback mechanism. An attacker can exploit this by rapidly registering unique namespaces in a loop, causing the server to continuously allocate memory until the system's available memory is exhausted.

The attack surface is amplified when multiple sybil peers (fake identities controlled by the same attacker) are used simultaneously, accelerating the memory exhaustion process. Since the vulnerability is exploitable over the network without authentication, any peer capable of connecting to a vulnerable rendezvous server can trigger the denial of service condition.

Root Cause

The root cause of this vulnerability is the absence of resource allocation controls in the namespace registration handler. The server implementation does not implement:

  • Per-peer namespace registration limits
  • Global namespace count restrictions
  • Memory allocation budgets for registration data
  • Rate limiting on registration requests

This oversight allows unbounded memory allocation based on untrusted peer input, violating the principle of defensive resource management in network-facing services.

Attack Vector

The attack exploits the network-accessible rendezvous server registration endpoint. An attacker performs the following steps:

  1. Establishes a connection to the target libp2p-rendezvous server
  2. Generates unique namespace strings in a continuous loop
  3. Sends registration requests for each unique namespace
  4. The server accepts and stores each registration, allocating memory
  5. Memory consumption grows until the server process is OOM-killed

The attack requires no authentication and can be executed remotely. The vulnerability is particularly concerning because libp2p-based systems often rely on rendezvous servers for critical peer discovery functionality, meaning a successful attack can disrupt entire decentralized networks.

For technical implementation details, refer to the GitHub Security Advisory.

Detection Methods for CVE-2026-35405

Indicators of Compromise

  • Abnormally high memory consumption on systems running libp2p-rendezvous servers
  • Rapid growth in registered namespace count from single or few peer identities
  • OOM-killer events in system logs targeting rendezvous server processes
  • Unusual patterns of registration requests from the same peer addresses

Detection Strategies

  • Monitor memory usage trends on rendezvous server hosts and alert on unusual growth patterns
  • Implement logging for namespace registration events and track per-peer registration counts
  • Deploy application-level metrics to track total registered namespaces over time
  • Configure system-level memory monitoring with alerting thresholds

Monitoring Recommendations

  • Set up resource monitoring dashboards for libp2p-rendezvous server processes
  • Implement log aggregation to detect patterns of excessive registration activity
  • Configure alerting for memory pressure events before OOM conditions occur
  • Monitor network traffic patterns to identify potential sybil attack sources

How to Mitigate CVE-2026-35405

Immediate Actions Required

  • Upgrade libp2p-rust to version 0.17.1 or later immediately
  • Audit all applications using libp2p-rendezvous server components for vulnerable versions
  • Consider temporarily restricting network access to rendezvous servers until patching is complete
  • Implement external rate limiting at the network layer as an interim measure

Patch Information

The vulnerability is fixed in libp2p-rust version 0.17.1. The patch introduces limits on namespace registrations per peer, preventing the resource exhaustion attack vector. Organizations should update their dependencies to the patched version through their package manager.

For detailed patch information and release notes, see the GitHub Security Advisory.

Workarounds

  • Deploy network-level rate limiting to restrict registration request frequency per IP or peer
  • Configure container or process memory limits to prevent system-wide impact from OOM conditions
  • Implement external monitoring to automatically restart the rendezvous server process if memory thresholds are exceeded
  • Consider using network access controls to limit which peers can connect to rendezvous servers
bash
# Example: Setting process memory limits using systemd
# Add to the service unit file for the rendezvous server
[Service]
MemoryMax=2G
MemoryHigh=1.5G

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechLibp2p

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-770
  • Technical References
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-35457: libp2p-rust DoS Vulnerability

  • CVE-2026-33040: Protocol Libp2p DOS Vulnerability

  • CVE-2023-39533: Libp2p Go-libp2p DoS Vulnerability

  • CVE-2026-34219: libp2p-rust Gossipsub RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English