logo

CVE-2025-54873 risc0-circuit-rv32im

Package

Manager: cargo
Name: risc0-circuit-rv32im
Vulnerable Version: >=2.0.0 <3.0.0

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:U/RC:R

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:U

EPSS: 0.00057 pctl0.178

Details

RISC Zero Underconstrained Vulnerability: Division Two issues were found: For some inputs to signed integer division, the circuit allowed two outputs, only one of which was valid. Additionally, the result of division by zero was underconstrained. This vulnerability was identified using the Picus tool from Veridise. Impacted on-chain verifiers have already been disabled via the estop mechanism outlined in the [Verifier Management Design](https://github.com/risc0/risc0-ethereum/blob/release-2.0/contracts/version-management-design.md#base-verifier-implementations). ## Mitigation We recommend all impacted users upgrade as soon as possible. Rust applications using the `risc0-zkvm` crate at versions < 2.2 should upgrade to version 2.2.0 or later. Smart contract applications using the official [RISC Zero Verifier Router](https://dev.risczero.com/api/blockchain-integration/contracts/verifier#verifier-router) do not need to take any action: zkVM version 2.2 is active on all official routers, and version 2.1 has been disabled. Smart contract applications not using the verifier router should update their contracts to send verification calls to the 2.2 version of the verifier.

Metadata

Created: 2025-08-05T17:42:06Z
Modified: 2025-08-06T14:32:02Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-f6rc-24x4-ppxp/GHSA-f6rc-24x4-ppxp.json
CWE IDs: ["CWE-369"]
Alternative ID: GHSA-f6rc-24x4-ppxp
Finding: F020
Auto approve: 1