A recent discovery of a transaction-relay jamming vulnerability has sparked concerns about the security of Bitcoin nodes, especially in the context of time-sensitive contracting protocols like the Lightning Network. This vulnerability exploits the transaction selection, announcement, and propagation mechanisms of Bitcoin’s base-layer full nodes, potentially allowing attackers to disrupt transactions and steal funds from Lightning channels.
The vulnerability involves two variations of a “transaction-relay throughput attack”: the “high overflow” and “low overflow” variants. These attacks target specific limits in Bitcoin’s transaction-relay system. The “High Overflow Attack” manipulates the fee-rate sorting mechanism and inventory broadcast limits of a node’s transaction inventory, flooding it with high-fee, low-value transactions to prevent lower-fee, time-sensitive transactions from propagating. On the other hand, the “Low Overflow Attack” overwhelms a node with excessive transaction announcements, leading to legitimate transactions being dropped or delayed.
Both attacks exploit the inherent throughput limitations in Bitcoin’s peer-to-peer network, posing a significant threat to systems relying on timely transaction propagation. The Lightning Network, in particular, is vulnerable to these attacks as it depends on pre-signed, time-sensitive transactions to secure off-chain payments.
Mitigation strategies have been proposed to counter these attacks, including random transaction rebroadcasting, dynamic fee adjustment, over-provisioning nodes, and limiting identical finality transactions. While these measures offer some protection, experts emphasize the importance of addressing the issue at Bitcoin’s base layer for more robust and long-term solutions.
The vulnerability was first reported to Bitcoin and Lightning developers in mid-2023 and publicly disclosed in December 2024 after months of discussions and testing. MITRE is currently tracking the attack under CVE Request 1780258. While no real-world exploits have been observed yet, further research and mitigation efforts are crucial to safeguard users against these sophisticated attacks.
This new transaction-relay jamming vulnerability underscores critical weaknesses in Bitcoin’s transaction-relay mechanisms that can be exploited against off-chain protocols like the Lightning Network. It is imperative to continue monitoring the situation and implementing necessary security measures to protect users from potential exploitation.
In conclusion, the security of Bitcoin nodes, especially in the context of time-sensitive contracting protocols, remains a pressing concern in the face of evolving cyber threats. Continued collaboration between security experts and developers is essential to identify and address vulnerabilities to ensure a secure and resilient cryptocurrency ecosystem.
