CVE-2025-64704: CWE-754: Improper Check for Unusual or Exceptional Conditions in bytecodealliance wasm-micro-runtime
WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. Prior to version 2.4.4, WAMR is susceptible to a segmentation fault in v128.store instruction. This issue has been patched in version 2.4.4.
AI Analysis
Technical Summary
CVE-2025-64704 identifies a vulnerability in the bytecodealliance's WebAssembly Micro Runtime (WAMR), a lightweight standalone runtime designed to execute WebAssembly (Wasm) modules efficiently, often used in embedded and edge computing environments. The flaw exists in versions prior to 2.4.4 and is related to improper handling of exceptional conditions during the execution of the v128.store instruction, which is used to store 128-bit SIMD vector data. Specifically, the runtime fails to correctly check for unusual or exceptional conditions, leading to a segmentation fault. This fault can cause the runtime to crash, resulting in a denial of service (DoS) condition. The vulnerability is classified under CWE-754, which concerns improper checks for unusual or exceptional conditions. The CVSS v3.1 base score is 4.7 (medium severity), reflecting that exploitation requires local access (AV:L), high attack complexity (AC:H), no privileges (PR:N), and user interaction (UI:R). The impact is limited to availability (A:H) with no confidentiality or integrity loss. No known exploits have been reported in the wild, and the issue has been addressed in WAMR version 2.4.4. This vulnerability is particularly relevant for environments where WAMR is embedded in IoT devices, edge computing platforms, or other resource-constrained systems where stability and uptime are critical.
Potential Impact
For European organizations, the primary impact of CVE-2025-64704 is the potential for denial of service in systems relying on WAMR for WebAssembly execution. This can disrupt critical embedded or edge computing applications, potentially affecting industrial control systems, IoT deployments, and real-time data processing platforms. While the vulnerability does not compromise data confidentiality or integrity, service interruptions could lead to operational downtime, impacting business continuity and possibly safety in industrial environments. Organizations in sectors such as manufacturing, automotive, telecommunications, and smart infrastructure that utilize embedded WebAssembly runtimes may face increased risk. The requirement for local access and user interaction limits remote exploitation but insider threats or compromised local users could trigger the fault. The absence of known exploits reduces immediate risk but does not eliminate the possibility of future targeted attacks. Timely patching is essential to maintain system reliability and avoid cascading failures in interconnected systems.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Upgrade all WAMR deployments to version 2.4.4 or later to apply the official patch addressing this vulnerability. 2) Conduct an inventory of systems using WAMR, especially embedded and edge devices, to identify vulnerable versions. 3) Restrict local access to devices running WAMR to trusted personnel only and enforce strict user authentication and authorization controls to minimize the risk of exploitation requiring user interaction. 4) Implement monitoring and alerting for abnormal crashes or segmentation faults in WAMR processes to detect potential exploitation attempts early. 5) Where feasible, sandbox or isolate WAMR execution environments to limit the impact of a crash on the broader system. 6) Review and harden the supply chain and update mechanisms for embedded devices to ensure timely deployment of security patches. 7) Educate local users about the risks of interacting with untrusted WebAssembly modules or inputs that could trigger the vulnerability. These targeted actions go beyond generic advice by focusing on the unique deployment contexts of WAMR in embedded and edge computing scenarios.
Affected Countries
Germany, Netherlands, France, United Kingdom, Italy, Sweden
CVE-2025-64704: CWE-754: Improper Check for Unusual or Exceptional Conditions in bytecodealliance wasm-micro-runtime
Description
WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. Prior to version 2.4.4, WAMR is susceptible to a segmentation fault in v128.store instruction. This issue has been patched in version 2.4.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-64704 identifies a vulnerability in the bytecodealliance's WebAssembly Micro Runtime (WAMR), a lightweight standalone runtime designed to execute WebAssembly (Wasm) modules efficiently, often used in embedded and edge computing environments. The flaw exists in versions prior to 2.4.4 and is related to improper handling of exceptional conditions during the execution of the v128.store instruction, which is used to store 128-bit SIMD vector data. Specifically, the runtime fails to correctly check for unusual or exceptional conditions, leading to a segmentation fault. This fault can cause the runtime to crash, resulting in a denial of service (DoS) condition. The vulnerability is classified under CWE-754, which concerns improper checks for unusual or exceptional conditions. The CVSS v3.1 base score is 4.7 (medium severity), reflecting that exploitation requires local access (AV:L), high attack complexity (AC:H), no privileges (PR:N), and user interaction (UI:R). The impact is limited to availability (A:H) with no confidentiality or integrity loss. No known exploits have been reported in the wild, and the issue has been addressed in WAMR version 2.4.4. This vulnerability is particularly relevant for environments where WAMR is embedded in IoT devices, edge computing platforms, or other resource-constrained systems where stability and uptime are critical.
Potential Impact
For European organizations, the primary impact of CVE-2025-64704 is the potential for denial of service in systems relying on WAMR for WebAssembly execution. This can disrupt critical embedded or edge computing applications, potentially affecting industrial control systems, IoT deployments, and real-time data processing platforms. While the vulnerability does not compromise data confidentiality or integrity, service interruptions could lead to operational downtime, impacting business continuity and possibly safety in industrial environments. Organizations in sectors such as manufacturing, automotive, telecommunications, and smart infrastructure that utilize embedded WebAssembly runtimes may face increased risk. The requirement for local access and user interaction limits remote exploitation but insider threats or compromised local users could trigger the fault. The absence of known exploits reduces immediate risk but does not eliminate the possibility of future targeted attacks. Timely patching is essential to maintain system reliability and avoid cascading failures in interconnected systems.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Upgrade all WAMR deployments to version 2.4.4 or later to apply the official patch addressing this vulnerability. 2) Conduct an inventory of systems using WAMR, especially embedded and edge devices, to identify vulnerable versions. 3) Restrict local access to devices running WAMR to trusted personnel only and enforce strict user authentication and authorization controls to minimize the risk of exploitation requiring user interaction. 4) Implement monitoring and alerting for abnormal crashes or segmentation faults in WAMR processes to detect potential exploitation attempts early. 5) Where feasible, sandbox or isolate WAMR execution environments to limit the impact of a crash on the broader system. 6) Review and harden the supply chain and update mechanisms for embedded devices to ensure timely deployment of security patches. 7) Educate local users about the risks of interacting with untrusted WebAssembly modules or inputs that could trigger the vulnerability. These targeted actions go beyond generic advice by focusing on the unique deployment contexts of WAMR in embedded and edge computing scenarios.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T14:07:42.920Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69262ac94ed5c2dbbb0fc27d
Added to database: 11/25/2025, 10:16:41 PM
Last enriched: 12/2/2025, 10:38:58 PM
Last updated: 1/10/2026, 10:13:36 PM
Views: 104
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.