CVE-2025-70954: n/a
A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specific pointer is null before accessing it. By sending a malicious transaction or smart contract, an attacker can trigger this null pointer dereference, causing the validator node process to crash (segmentation fault). This results in a Denial of Service (DoS) affecting the availability of the entire blockchain network.
AI Analysis
Technical Summary
CVE-2025-70954 is a null pointer dereference vulnerability affecting the TON Virtual Machine (TVM), a core component of the TON Blockchain infrastructure. The vulnerability resides specifically in the execution logic of the INMSGPARAM instruction, which is responsible for handling message parameters within smart contract execution. The issue arises because the program does not verify whether a pointer is null before dereferencing it. When a maliciously crafted transaction or smart contract invokes this instruction with a null pointer, it causes the validator node process to crash due to a segmentation fault. This crash results in a Denial of Service (DoS) condition, disrupting the validator node's ability to participate in consensus and validate transactions. Since validator nodes are critical to maintaining blockchain availability and integrity, their failure can degrade network performance or cause temporary outages. The vulnerability requires no privileges or user interaction, making it remotely exploitable by anyone able to submit transactions to the network. The CVSS v3.1 base score of 7.5 reflects the high impact on availability (A:H) with network attack vector (AV:N), low attack complexity (AC:L), and no privileges required (PR:N). The vulnerability is categorized under CWE-476 (NULL Pointer Dereference), a common programming error that leads to crashes or undefined behavior. No patches or mitigations are linked yet, but upgrading to TON Blockchain version 2025.06 or later is expected to resolve the issue. No known exploits have been reported in the wild as of the publication date, but the potential for disruption to blockchain validator nodes is significant.
Potential Impact
The primary impact of CVE-2025-70954 is a Denial of Service (DoS) on validator nodes within the TON Blockchain network. Validator nodes are essential for transaction validation, consensus, and overall network stability. If an attacker exploits this vulnerability, they can cause one or more validator nodes to crash repeatedly, reducing the number of active validators and potentially degrading the network's fault tolerance and throughput. This can lead to slower transaction processing, temporary network outages, or even forks if consensus is disrupted. The availability impact is critical for organizations relying on the TON Blockchain for financial transactions, decentralized applications, or other services. While confidentiality and integrity are not directly affected, the disruption of service can undermine trust and cause financial or reputational damage. The ease of exploitation—requiring no authentication or user interaction—means that attackers can launch attacks at scale remotely. This vulnerability could also be leveraged in coordinated attacks to destabilize the blockchain network, affecting all participants globally. Until patched, organizations operating validator nodes face increased operational risk and potential downtime.
Mitigation Recommendations
To mitigate CVE-2025-70954, organizations should prioritize upgrading their TON Blockchain validator nodes to version 2025.06 or later, where the null pointer dereference issue has been addressed. In the absence of an immediate patch, operators can implement temporary protective measures such as input validation and transaction filtering at the network or application layer to detect and block malformed transactions that attempt to exploit the INMSGPARAM instruction. Monitoring validator node logs and crash reports can help identify exploitation attempts early. Deploying redundant validator nodes and load balancing can reduce the impact of individual node crashes on overall network availability. Additionally, implementing automated node restart mechanisms can minimize downtime caused by crashes. Network-level protections such as rate limiting and transaction submission controls can also reduce attack surface. Finally, maintaining up-to-date backups and disaster recovery plans ensures rapid restoration of validator services if disruption occurs. Collaboration with the TON Blockchain developer community for timely patch releases and security advisories is essential.
Affected Countries
United States, Germany, South Korea, Japan, Singapore, Switzerland, United Kingdom, Canada, Netherlands, Russia
CVE-2025-70954: n/a
Description
A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specific pointer is null before accessing it. By sending a malicious transaction or smart contract, an attacker can trigger this null pointer dereference, causing the validator node process to crash (segmentation fault). This results in a Denial of Service (DoS) affecting the availability of the entire blockchain network.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-70954 is a null pointer dereference vulnerability affecting the TON Virtual Machine (TVM), a core component of the TON Blockchain infrastructure. The vulnerability resides specifically in the execution logic of the INMSGPARAM instruction, which is responsible for handling message parameters within smart contract execution. The issue arises because the program does not verify whether a pointer is null before dereferencing it. When a maliciously crafted transaction or smart contract invokes this instruction with a null pointer, it causes the validator node process to crash due to a segmentation fault. This crash results in a Denial of Service (DoS) condition, disrupting the validator node's ability to participate in consensus and validate transactions. Since validator nodes are critical to maintaining blockchain availability and integrity, their failure can degrade network performance or cause temporary outages. The vulnerability requires no privileges or user interaction, making it remotely exploitable by anyone able to submit transactions to the network. The CVSS v3.1 base score of 7.5 reflects the high impact on availability (A:H) with network attack vector (AV:N), low attack complexity (AC:L), and no privileges required (PR:N). The vulnerability is categorized under CWE-476 (NULL Pointer Dereference), a common programming error that leads to crashes or undefined behavior. No patches or mitigations are linked yet, but upgrading to TON Blockchain version 2025.06 or later is expected to resolve the issue. No known exploits have been reported in the wild as of the publication date, but the potential for disruption to blockchain validator nodes is significant.
Potential Impact
The primary impact of CVE-2025-70954 is a Denial of Service (DoS) on validator nodes within the TON Blockchain network. Validator nodes are essential for transaction validation, consensus, and overall network stability. If an attacker exploits this vulnerability, they can cause one or more validator nodes to crash repeatedly, reducing the number of active validators and potentially degrading the network's fault tolerance and throughput. This can lead to slower transaction processing, temporary network outages, or even forks if consensus is disrupted. The availability impact is critical for organizations relying on the TON Blockchain for financial transactions, decentralized applications, or other services. While confidentiality and integrity are not directly affected, the disruption of service can undermine trust and cause financial or reputational damage. The ease of exploitation—requiring no authentication or user interaction—means that attackers can launch attacks at scale remotely. This vulnerability could also be leveraged in coordinated attacks to destabilize the blockchain network, affecting all participants globally. Until patched, organizations operating validator nodes face increased operational risk and potential downtime.
Mitigation Recommendations
To mitigate CVE-2025-70954, organizations should prioritize upgrading their TON Blockchain validator nodes to version 2025.06 or later, where the null pointer dereference issue has been addressed. In the absence of an immediate patch, operators can implement temporary protective measures such as input validation and transaction filtering at the network or application layer to detect and block malformed transactions that attempt to exploit the INMSGPARAM instruction. Monitoring validator node logs and crash reports can help identify exploitation attempts early. Deploying redundant validator nodes and load balancing can reduce the impact of individual node crashes on overall network availability. Additionally, implementing automated node restart mechanisms can minimize downtime caused by crashes. Network-level protections such as rate limiting and transaction submission controls can also reduce attack surface. Finally, maintaining up-to-date backups and disaster recovery plans ensures rapid restoration of validator services if disruption occurs. Collaboration with the TON Blockchain developer community for timely patch releases and security advisories is essential.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 698f9c59c9e1ff5ad86a8ec7
Added to database: 2/13/2026, 9:49:13 PM
Last enriched: 2/20/2026, 10:33:47 PM
Last updated: 4/6/2026, 7:49:53 PM
Views: 107
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.