Wiz Agents & Workflows are here
Vulnerability DatabaseRUSTSEC-2020-0036

RUSTSEC-2020-0036
Rust vulnerability analysis and mitigation

Overview

The failure crate through version 0.1.5 for Rust contains a type confusion vulnerability (RUSTSEC-2020-0036) that may introduce compatibility hazards in applications. This vulnerability was identified in September 2020 and affects the unmaintained failure crate. The issue primarily impacts applications using the failure crate for error handling in Rust applications (NVD, Debian).

Technical details

The vulnerability is characterized by a type confusion flaw that occurs during downcasting operations. It has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue is classified under CWE-843 (Access of Resource Using Incompatible Type - 'Type Confusion') (NVD).

Impact

The vulnerability could potentially lead to type confusion attacks, which may result in memory corruption or other security-related issues in affected applications. The critical CVSS score indicates potential for complete compromise of system confidentiality, integrity, and availability if exploited (NVD).

Mitigation and workarounds

The primary mitigation is to migrate away from the failure crate as it has been officially deprecated. Users are recommended to switch to alternative error handling solutions such as anyhow or thiserror crates. The failure crate is no longer maintained, and no direct fixes are available for the vulnerability (GitHub).

Community reactions

The Rust community has largely moved away from the failure crate following its deprecation announcement. The maintainers officially deprecated the crate in May 2020, acknowledging its historical importance in shaping Rust's error-handling landscape while recommending migration to newer alternatives (GitHub).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-fxc9-7j2w-vx54CRITICAL9.3
  • RustRust
  • mpp
NoYesMar 29, 2026
CVE-2026-34202CRITICAL9.2
  • RustRust
  • zebra-chain
NoYesMar 27, 2026
CVE-2026-34377HIGH8.4
  • RustRust
  • zebrad
NoYesMar 30, 2026
CVE-2026-34219HIGH8.2
  • RustRust
  • libp2p-gossipsub
NoYesMar 30, 2026
RUSTSEC-2026-0078N/AN/A
  • RustRust
  • intaglio
NoYesMar 30, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management