CVE-2025-64704: CWE-754: Improper Check for Unusual or Exceptional Conditions in bytecodealliance wasm-micro-runtime
WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. Prior to version 2.4.4, WAMR is susceptible to a segmentation fault in v128.store instruction. This issue has been patched in version 2.4.4.
AI Analysis
Technical Summary
CVE-2025-64704 identifies a vulnerability in the WebAssembly Micro Runtime (WAMR), a lightweight standalone runtime designed to execute WebAssembly (Wasm) modules efficiently in constrained environments. The issue arises from an improper check for unusual or exceptional conditions (CWE-754) specifically related to the v128.store instruction, which handles 128-bit SIMD vector storage operations. Prior to version 2.4.4, WAMR does not correctly validate or handle edge cases during the execution of this instruction, leading to a segmentation fault that causes the runtime to crash. This vulnerability can be triggered by a crafted Wasm module or input that causes the runtime to attempt an invalid memory access during the v128.store operation. The CVSS 3.1 base score is 4.7 (medium), reflecting that exploitation requires local access (AV:L), high attack complexity (AC:H), no privileges (PR:N), and user interaction (UI:R). The impact is limited to availability, as confidentiality and integrity are not affected. No known exploits have been reported in the wild, and the issue was patched in WAMR version 2.4.4. This vulnerability is particularly relevant for embedded systems, IoT devices, and edge computing platforms that leverage WAMR for running Wasm workloads, where stability and uptime are critical. The root cause is insufficient validation of exceptional conditions during SIMD instruction execution, highlighting the importance of rigorous input validation and error handling in Wasm runtimes.
Potential Impact
For European organizations, the primary impact of CVE-2025-64704 is a potential denial of service due to segmentation faults causing runtime crashes. This can disrupt critical embedded or edge computing applications that rely on WAMR for executing Wasm modules, potentially affecting industrial automation, IoT device functionality, and real-time data processing systems. Although the vulnerability does not compromise data confidentiality or integrity, service interruptions can lead to operational downtime, financial losses, and reduced reliability of critical infrastructure. Organizations in sectors such as manufacturing, automotive, telecommunications, and smart city deployments—where embedded Wasm runtimes are increasingly adopted—may experience degraded service availability. The requirement for local access and user interaction limits remote exploitation risks but does not eliminate insider threat or accidental triggering scenarios. The absence of known exploits in the wild reduces immediate risk but underscores the need for proactive patching to prevent future exploitation attempts.
Mitigation Recommendations
1. Upgrade all instances of WebAssembly Micro Runtime to version 2.4.4 or later, where the vulnerability has been patched. 2. Conduct an inventory of embedded and edge devices using WAMR to identify vulnerable versions. 3. Audit Wasm modules that utilize v128 SIMD instructions to ensure they do not trigger exceptional conditions or invalid memory accesses. 4. Implement robust input validation and exception handling within Wasm modules and the host environment to prevent malformed inputs from causing crashes. 5. Restrict local access to devices running WAMR to trusted personnel and enforce strict user interaction policies to reduce exploitation likelihood. 6. Monitor runtime logs for segmentation faults or abnormal crashes indicative of attempted exploitation. 7. Develop incident response plans for rapid recovery from potential denial of service events affecting embedded systems. 8. Engage with vendors and suppliers to ensure timely updates and security patches for embedded platforms using WAMR.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden
CVE-2025-64704: CWE-754: Improper Check for Unusual or Exceptional Conditions in bytecodealliance wasm-micro-runtime
Description
WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. Prior to version 2.4.4, WAMR is susceptible to a segmentation fault in v128.store instruction. This issue has been patched in version 2.4.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-64704 identifies a vulnerability in the WebAssembly Micro Runtime (WAMR), a lightweight standalone runtime designed to execute WebAssembly (Wasm) modules efficiently in constrained environments. The issue arises from an improper check for unusual or exceptional conditions (CWE-754) specifically related to the v128.store instruction, which handles 128-bit SIMD vector storage operations. Prior to version 2.4.4, WAMR does not correctly validate or handle edge cases during the execution of this instruction, leading to a segmentation fault that causes the runtime to crash. This vulnerability can be triggered by a crafted Wasm module or input that causes the runtime to attempt an invalid memory access during the v128.store operation. The CVSS 3.1 base score is 4.7 (medium), reflecting that exploitation requires local access (AV:L), high attack complexity (AC:H), no privileges (PR:N), and user interaction (UI:R). The impact is limited to availability, as confidentiality and integrity are not affected. No known exploits have been reported in the wild, and the issue was patched in WAMR version 2.4.4. This vulnerability is particularly relevant for embedded systems, IoT devices, and edge computing platforms that leverage WAMR for running Wasm workloads, where stability and uptime are critical. The root cause is insufficient validation of exceptional conditions during SIMD instruction execution, highlighting the importance of rigorous input validation and error handling in Wasm runtimes.
Potential Impact
For European organizations, the primary impact of CVE-2025-64704 is a potential denial of service due to segmentation faults causing runtime crashes. This can disrupt critical embedded or edge computing applications that rely on WAMR for executing Wasm modules, potentially affecting industrial automation, IoT device functionality, and real-time data processing systems. Although the vulnerability does not compromise data confidentiality or integrity, service interruptions can lead to operational downtime, financial losses, and reduced reliability of critical infrastructure. Organizations in sectors such as manufacturing, automotive, telecommunications, and smart city deployments—where embedded Wasm runtimes are increasingly adopted—may experience degraded service availability. The requirement for local access and user interaction limits remote exploitation risks but does not eliminate insider threat or accidental triggering scenarios. The absence of known exploits in the wild reduces immediate risk but underscores the need for proactive patching to prevent future exploitation attempts.
Mitigation Recommendations
1. Upgrade all instances of WebAssembly Micro Runtime to version 2.4.4 or later, where the vulnerability has been patched. 2. Conduct an inventory of embedded and edge devices using WAMR to identify vulnerable versions. 3. Audit Wasm modules that utilize v128 SIMD instructions to ensure they do not trigger exceptional conditions or invalid memory accesses. 4. Implement robust input validation and exception handling within Wasm modules and the host environment to prevent malformed inputs from causing crashes. 5. Restrict local access to devices running WAMR to trusted personnel and enforce strict user interaction policies to reduce exploitation likelihood. 6. Monitor runtime logs for segmentation faults or abnormal crashes indicative of attempted exploitation. 7. Develop incident response plans for rapid recovery from potential denial of service events affecting embedded systems. 8. Engage with vendors and suppliers to ensure timely updates and security patches for embedded platforms using WAMR.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T14:07:42.920Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69262ac94ed5c2dbbb0fc27d
Added to database: 11/25/2025, 10:16:41 PM
Last enriched: 11/25/2025, 10:32:34 PM
Last updated: 11/26/2025, 1:02:28 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65957: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Intercore-Productions Core-Bot
HighCVE-2025-64657: CWE-121: Stack-based Buffer Overflow in Microsoft Azure App Gateway
CriticalCVE-2025-64656: CWE-125: Out-of-bounds Read in Microsoft Azure App Gateway
CriticalRussian Hackers Target US Engineering Firm Because of Work Done for Ukrainian Sister City
MediumCVE-2025-66019: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.