
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in the ark-r1cs-std crate before version 0.3.1 for Rust. The vulnerability exists in the FieldVar::mul_by_inverse method which does not enforce any constraints, allowing a malicious prover to produce an unsound proof that still passes all verifier checks (RUSTSEC Advisory, NVD).
The vulnerability affects the FieldVar::mul_by_inverse method in versions 0.2.0 to 0.3.0 of ark-r1cs-std. This method was primarily used in scalar multiplication for short_weierstrass::ProjectiveVar. The lack of constraint enforcement in this method creates a critical security flaw in the R1CS constraint systems. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability allows a malicious prover to create unsound proofs that would still pass verification checks. This undermines the cryptographic security guarantees of the zero-knowledge proof system, as it enables the creation of invalid proofs that appear valid to verifiers (RUSTSEC Advisory).
The vulnerability has been fixed in version 0.3.1 of ark-r1cs-std. Users should upgrade to this version or later to receive the security fix. The fix was implemented in commit 47ddbaa and released as part of version 0.3.1 on crates.io (RUSTSEC Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."