Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58157: CWE-400: Uncontrolled Resource Consumption in Consensys gnark

0
High
VulnerabilityCVE-2025-58157cvecve-2025-58157cwe-400
Published: Fri Aug 29 2025 (08/29/2025, 21:21:35 UTC)
Source: CVE Database V5
Vendor/Project: Consensys
Product: gnark

Description

gnark is a zero-knowledge proof system framework. In version 0.12.0, there is a potential denial of service vulnerability when computing scalar multiplication is using the fake-GLV algorithm. This is because the algorithm didn't converge quickly enough for some of the inputs. This issue has been patched in version 0.13.0.

AI-Powered Analysis

AILast updated: 09/07/2025, 00:43:59 UTC

Technical Analysis

CVE-2025-58157 is a high-severity vulnerability affecting version 0.12.0 of Consensys' gnark, a zero-knowledge proof system framework widely used in cryptographic applications. The vulnerability is classified under CWE-400, indicating uncontrolled resource consumption. Specifically, the issue arises during scalar multiplication computations when using the fake-GLV algorithm. The algorithm fails to converge quickly enough for certain inputs, leading to excessive resource usage that can cause a denial of service (DoS). This means an attacker can craft inputs that cause the system to consume excessive CPU or memory resources, potentially rendering the gnark-based service unresponsive or crashing it. The vulnerability does not impact confidentiality or integrity but severely affects availability. It can be exploited remotely without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vendor has addressed this issue in version 0.13.0 by improving the convergence behavior of the fake-GLV algorithm, mitigating the risk of resource exhaustion. No known exploits are currently reported in the wild, but the ease of exploitation and the critical role of gnark in cryptographic proofs make this a significant threat for affected deployments.

Potential Impact

For European organizations leveraging gnark 0.12.0 in blockchain, privacy-preserving applications, or cryptographic proof systems, this vulnerability poses a substantial risk to service availability. A successful DoS attack could disrupt critical operations relying on zero-knowledge proofs, such as confidential transactions, identity verification, or secure multiparty computations. This disruption could lead to operational downtime, loss of trust from clients or partners, and potential financial consequences. Given the increasing adoption of zero-knowledge proofs in European fintech, legal tech, and privacy-focused sectors, the impact could extend to regulatory compliance challenges if services become unavailable during critical periods. Furthermore, organizations providing zero-knowledge proof services as part of infrastructure or SaaS offerings may face reputational damage and customer churn if exploited.

Mitigation Recommendations

European organizations should urgently upgrade gnark to version 0.13.0 or later, where the vulnerability has been patched. In addition, they should implement input validation and rate limiting on scalar multiplication requests to prevent abuse with malicious inputs that trigger the fake-GLV algorithm's slow convergence. Monitoring resource usage patterns and setting thresholds for CPU and memory consumption can help detect and mitigate ongoing attacks. Deploying gnark within containerized or sandboxed environments with resource quotas can limit the impact of potential DoS attempts. Organizations should also review their cryptographic workflows to identify any dependencies on vulnerable gnark versions and coordinate with vendors or internal teams to ensure timely patching. Finally, maintaining an incident response plan that includes DoS scenarios related to cryptographic components will improve resilience.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-27T13:34:56.186Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b21c80ad5a09ad007ba040

Added to database: 8/29/2025, 9:32:48 PM

Last enriched: 9/7/2025, 12:43:59 AM

Last updated: 10/14/2025, 12:30:37 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats