Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70954: n/a

0
High
VulnerabilityCVE-2025-70954cvecve-2025-70954
Published: Fri Feb 13 2026 (02/13/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specific pointer is null before accessing it. By sending a malicious transaction or smart contract, an attacker can trigger this null pointer dereference, causing the validator node process to crash (segmentation fault). This results in a Denial of Service (DoS) affecting the availability of the entire blockchain network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/20/2026, 22:33:47 UTC

Technical Analysis

CVE-2025-70954 is a null pointer dereference vulnerability affecting the TON Virtual Machine (TVM), a core component of the TON Blockchain infrastructure. The vulnerability resides specifically in the execution logic of the INMSGPARAM instruction, which is responsible for handling message parameters within smart contract execution. The issue arises because the program does not verify whether a pointer is null before dereferencing it. When a maliciously crafted transaction or smart contract invokes this instruction with a null pointer, it causes the validator node process to crash due to a segmentation fault. This crash results in a Denial of Service (DoS) condition, disrupting the validator node's ability to participate in consensus and validate transactions. Since validator nodes are critical to maintaining blockchain availability and integrity, their failure can degrade network performance or cause temporary outages. The vulnerability requires no privileges or user interaction, making it remotely exploitable by anyone able to submit transactions to the network. The CVSS v3.1 base score of 7.5 reflects the high impact on availability (A:H) with network attack vector (AV:N), low attack complexity (AC:L), and no privileges required (PR:N). The vulnerability is categorized under CWE-476 (NULL Pointer Dereference), a common programming error that leads to crashes or undefined behavior. No patches or mitigations are linked yet, but upgrading to TON Blockchain version 2025.06 or later is expected to resolve the issue. No known exploits have been reported in the wild as of the publication date, but the potential for disruption to blockchain validator nodes is significant.

Potential Impact

The primary impact of CVE-2025-70954 is a Denial of Service (DoS) on validator nodes within the TON Blockchain network. Validator nodes are essential for transaction validation, consensus, and overall network stability. If an attacker exploits this vulnerability, they can cause one or more validator nodes to crash repeatedly, reducing the number of active validators and potentially degrading the network's fault tolerance and throughput. This can lead to slower transaction processing, temporary network outages, or even forks if consensus is disrupted. The availability impact is critical for organizations relying on the TON Blockchain for financial transactions, decentralized applications, or other services. While confidentiality and integrity are not directly affected, the disruption of service can undermine trust and cause financial or reputational damage. The ease of exploitation—requiring no authentication or user interaction—means that attackers can launch attacks at scale remotely. This vulnerability could also be leveraged in coordinated attacks to destabilize the blockchain network, affecting all participants globally. Until patched, organizations operating validator nodes face increased operational risk and potential downtime.

Mitigation Recommendations

To mitigate CVE-2025-70954, organizations should prioritize upgrading their TON Blockchain validator nodes to version 2025.06 or later, where the null pointer dereference issue has been addressed. In the absence of an immediate patch, operators can implement temporary protective measures such as input validation and transaction filtering at the network or application layer to detect and block malformed transactions that attempt to exploit the INMSGPARAM instruction. Monitoring validator node logs and crash reports can help identify exploitation attempts early. Deploying redundant validator nodes and load balancing can reduce the impact of individual node crashes on overall network availability. Additionally, implementing automated node restart mechanisms can minimize downtime caused by crashes. Network-level protections such as rate limiting and transaction submission controls can also reduce attack surface. Finally, maintaining up-to-date backups and disaster recovery plans ensures rapid restoration of validator services if disruption occurs. Collaboration with the TON Blockchain developer community for timely patch releases and security advisories is essential.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698f9c59c9e1ff5ad86a8ec7

Added to database: 2/13/2026, 9:49:13 PM

Last enriched: 2/20/2026, 10:33:47 PM

Last updated: 4/6/2026, 7:49:53 PM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses