VYPR
High severityNVD Advisory· Published Nov 17, 2022· Updated Apr 22, 2025

Witness Block Parsing DoS Vulnerability in lnd

CVE-2022-39389

Description

Lightning Network Daemon (lnd) is an implementation of a lightning bitcoin overlay network node. All lnd nodes before version v0.15.4 are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected. This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC. A patch is available in lnd version 0.15.4. Users are advised to upgrade. Users unable to upgrade may use the lncli updatechanpolicy RPC call to increase their CLTV value to a very high amount or increase their fee policies. This will prevent nodes from routing through your node, meaning that no pending HTLCs can be present.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

LND nodes before v0.15.4 have a block parsing bug causing degraded state, risking loss of funds via CSV/CLTV expiry.

Vulnerability

Lightning Network Daemon (lnd) nodes prior to version v0.15.4 are vulnerable to a block parsing bug that triggers when processing transactions with a very large number of witness inputs [1][2][4]. Once encountered, the node enters a degraded state where it can no longer properly parse blocks, leading to critical functionality loss.

Exploitation

An attacker can exploit this by broadcasting a transaction with an excessive number of witness inputs, which is parsed incorrectly by the vulnerable node [4]. No authentication is required beyond network connectivity; the bug affects the default block processing routine. In the degraded state, the node can still make payments and forward HTLCs, but it cannot open new channels and fails to detect on-chain transaction events [1][4].

Impact

This impairment can lead to loss of funds if a CSV expiry is reached during a channel breach attempt or a CLTV delta expires while HTLC funds remain locked, as the node will not react to on-chain events [1][4]. The node effectively becomes blind to certain on-chain activity, increasing risk of fund loss.

Mitigation

A patch is available in lnd version 0.15.4 [2]. Users unable to upgrade can use the lncli updatechanpolicy RPC to set a very high CLTV value or increase fee policies, which prevents other nodes from routing through them, thereby avoiding pending HTLCs that could be affected [1][4].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/lightningnetwork/lndGo
< 0.15.4-beta0.15.4-beta

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.