Filecoin nodes consuming F3 messages are vulnerable. go-f3 panics when it validates a "poison" messages. A "poison" message can can cause integer overflow in the signer index validation. In Lotus' case, the whole node will crash.
There is no barrier to entry. An attacker doesn't need any power to pull off this attack.
These malicious messages aren't self-propagating since the bug is in the validator. An attacker needs to directly send the message to all targets.
The fix was merged and released with go-f3 0.8.7. All node software (Lotus, Forest, Venus) are using a patched version of go-f3 with their updates for the nv27 network upgrade.
go-f3 now does proper overflow checking using math.MaxInt64
comparison and returns error "justificationPower overflow"
when overflow would occur.
The are no immediate workarounds available. Nodes should upgrade to the patched version, which they will have done if participating in nv27 on Filecoin mainnet.
The initial finding(unrelated path) was reported by 0xNirix via bug bounty program which wasn't high issue. The further digging by developers led to this finding. Thank you for the contributions.
{ "severity": "HIGH", "github_reviewed": true, "nvd_published_at": "2025-09-29T23:15:32Z", "github_reviewed_at": "2025-09-29T20:40:08Z", "cwe_ids": [ "CWE-190" ] }