CVE-2024-51745
Rust vulnerability analysis and mitigation

Overview

Wasmtime, a fast and secure runtime for WebAssembly, contains a vulnerability (CVE-2024-51745) discovered in November 2024. The vulnerability affects Wasmtime's filesystem sandbox implementation on Windows, which fails to block access to special device filenames using superscript digits (e.g., 'COM¹', 'COM²', 'LPT⁰', 'LPT¹'). This affects versions up to 24.0.1, 25.0.2, and 26.0.0 (GitHub Advisory).

Technical details

The vulnerability stems from an incomplete implementation of Windows device filename blocking in Wasmtime's sandbox. While the sandbox blocks standard device filenames like 'COM1' and 'LPT1', it fails to block their superscript digit variants. Windows recognizes these superscript digits (¹, ², ³) as valid parts of device names, making them reserved in every directory. The vulnerability has been assigned a CVSS v4.0 score of 2.3 (Low) with the vector string CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N (GitHub Advisory).

Impact

Untrusted WebAssembly programs with access to any filesystem directory can bypass the sandbox and access peripheral devices through these special device filenames. This access extends to modems, printers, network printers, and any device connected to a serial or parallel port, including emulated USB serial ports (GitHub Advisory).

Mitigation and workarounds

Patch releases have been issued as Wasmtime versions 24.0.2, 25.0.3, and 26.0.1. Users of Wasmtime 23.0.x and prior versions are recommended to upgrade to one of these patched versions. There are no known workarounds for this issue, and affected Windows users must upgrade to a patched version (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-2cgv-28vr-rv6jHIGH8.8
  • RustRust
  • libcrux-intrinsics
NoYesDec 04, 2025
GHSA-xrv8-2pf5-f3q7MEDIUM6
  • RustRust
  • nitro-tpm-pcr-compute
NoYesDec 05, 2025
GHSA-mj73-j457-8x9qLOW2.7
  • RustRust
  • maxminddb
NoYesDec 02, 2025
GHSA-pq5v-rwp8-p7gmLOW2.7
  • RustRust
  • rtvm-interpreter
NoNoDec 02, 2025
RUSTSEC-2025-0133N/AN/A
  • RustRust
  • libcrux-intrinsics
NoYesDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management