ghsa-f6rc-24x4-ppxp
Vulnerability from github
Two issues were found: For some inputs to signed integer division, the circuit allowed two outputs, only one of which was valid. Additionally, the result of division by zero was underconstrained.
This vulnerability was identified using the Picus tool from Veridise.
Impacted on-chain verifiers have already been disabled via the estop mechanism outlined in the Verifier Management Design.
Mitigation
We recommend all impacted users upgrade as soon as possible.
Rust applications using the risc0-zkvm
crate at versions < 2.2 should upgrade to version 2.2.0 or later.
Smart contract applications using the official RISC Zero Verifier Router do not need to take any action: zkVM version 2.2 is active on all official routers, and version 2.1 has been disabled.
Smart contract applications not using the verifier router should update their contracts to send verification calls to the 2.2 version of the verifier.
{ "affected": [ { "package": { "ecosystem": "crates.io", "name": "risc0-zkvm" }, "ranges": [ { "events": [ { "introduced": "2.0.0" }, { "fixed": "2.2.0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "crates.io", "name": "risc0-circuit-rv32im" }, "ranges": [ { "events": [ { "introduced": "2.0.0" }, { "fixed": "3.0.0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "crates.io", "name": "risc0-circuit-rv32im-sys" }, "ranges": [ { "events": [ { "introduced": "2.0.0" }, { "fixed": "3.0.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-54873" ], "database_specific": { "cwe_ids": [ "CWE-369" ], "github_reviewed": true, "github_reviewed_at": "2025-08-05T17:42:06Z", "nvd_published_at": "2025-08-06T00:15:31Z", "severity": "LOW" }, "details": "Two issues were found: For some inputs to signed integer division, the circuit allowed two outputs, only one of which was valid. Additionally, the result of division by zero was underconstrained.\n\nThis vulnerability was identified using the Picus tool from Veridise. \n\nImpacted on-chain verifiers have already been disabled via the estop mechanism outlined in the [Verifier Management Design](https://github.com/risc0/risc0-ethereum/blob/release-2.0/contracts/version-management-design.md#base-verifier-implementations). \n\n## Mitigation\n\nWe recommend all impacted users upgrade as soon as possible.\n\nRust applications using the `risc0-zkvm` crate at versions \u003c 2.2 should upgrade to version 2.2.0 or later. \n\nSmart contract applications using the official [RISC Zero Verifier Router](https://dev.risczero.com/api/blockchain-integration/contracts/verifier#verifier-router) do not need to take any action: zkVM version 2.2 is active on all official routers, and version 2.1 has been disabled.\n\nSmart contract applications not using the verifier router should update their contracts to send verification calls to the 2.2 version of the verifier.", "id": "GHSA-f6rc-24x4-ppxp", "modified": "2025-08-06T14:32:02Z", "published": "2025-08-05T17:42:06Z", "references": [ { "type": "WEB", "url": "https://github.com/risc0/risc0/security/advisories/GHSA-f6rc-24x4-ppxp" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54873" }, { "type": "WEB", "url": "https://github.com/risc0/risc0/pull/3235" }, { "type": "WEB", "url": "https://github.com/risc0/zirgen/pull/249" }, { "type": "PACKAGE", "url": "https://github.com/risc0/risc0" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:U", "type": "CVSS_V4" } ], "summary": "RISC Zero Underconstrained Vulnerability: Division" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.