CVE-2025-52484
Rust vulnerability analysis and mitigation

Overview

RISC Zero, a general computing platform based on zk-STARKs and the RISC-V microarchitecture, disclosed a critical vulnerability (CVE-2025-52484) on June 20, 2025. The vulnerability affects risc0-zkvm versions 2.0.0 through 2.0.2 and stems from a missing constraint in the rv32im circuit that impacts any 3-register RISC-V instruction, including remu and divu operations. The vulnerability was discovered by Christoph Hochrainer through the Hackenproof bug bounty program (GitHub Advisory).

Technical details

The vulnerability allows a malicious prover to exploit the RISC-V virtual machine by manipulating it to treat the value of the rs1 register as identical to the rs2 register due to insufficient constraints in the rv32im circuit. The issue received a CVSS v4.0 score of 2.7 (Low) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U. The vulnerability is classified under CWE-345 (Insufficient Verification of Data Authenticity) (NVD, Wiz).

Impact

The vulnerability could potentially allow a malicious prover to manipulate register values in the RISC-V virtual machine, potentially compromising the integrity of computations performed within the zkVM environment. The impact is considered low severity according to the CVSS score, primarily affecting the integrity of the system without compromising confidentiality or availability (GitHub Advisory).

Mitigation and workarounds

Rust applications using the risc0-zkvm crate at versions 2.0.0, 2.0.1, and 2.0.2 should upgrade to version 2.1.0. Smart contract applications using the official RISC Zero Verifier Router do not need to take any action as zkVM version 2.1 is already active on all official routers, and version 2.0 has been disabled. Smart contract applications not using the verifier router should update their contracts to send verification calls to the 2.1 version of the verifier. The fix was implemented through zirgen/pull/238 and risc0/pull/3181 (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22257HIGH8.8
  • RustRust
  • salvo
NoYesJan 08, 2026
CVE-2026-22698HIGH8.7
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22699HIGH7.5
  • RustRust
  • sm2
NoNoJan 10, 2026
GHSA-g59m-gf8j-gjf5LOW3.7
  • RustRust
  • aws-sdk-neptunedata
NoYesJan 08, 2026
GHSA-585q-cm62-757jLOW2
  • RustRust
  • mnl
NoNoJan 09, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management