Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70956: n/a

0
High
VulnerabilityCVE-2025-70956cvecve-2025-70956
Published: Fri Feb 13 2026 (02/13/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-70956 is a high-severity vulnerability in the TON Virtual Machine (TVM) affecting versions before v2025. 04. The flaw resides in the RUNVM instruction logic responsible for initializing child virtual machines, where critical resources are transferred from the parent to child state non-atomically. If an Out-of-Gas (OOG) exception occurs after resource transfer but before finalizing the state transition, the parent VM ends up with a corrupted state missing essential resources. This corrupted state causes the parent VM to continue execution abnormally, potentially leading to denial of service within the smart contract's execution context. The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires no privileges or user interaction and can be triggered remotely. No known exploits are reported in the wild yet, and no patches have been linked. Organizations using the TON blockchain platform and its smart contracts are at risk, especially those relying on TVM for contract execution. Mitigation requires careful atomic handling of resource transfers during VM state transitions and monitoring for OOG exceptions.

AI-Powered Analysis

AILast updated: 02/20/2026, 22:37:02 UTC

Technical Analysis

CVE-2025-70956 identifies a state pollution vulnerability within the TON Virtual Machine (TVM) prior to version 2025.04. The vulnerability is rooted in the RUNVM instruction logic, specifically in the VmState::run_child_vm function, which initializes child virtual machines by transferring critical resources such as libraries and logs from the parent VM state to the child VM state. This transfer is performed in a non-atomic manner, meaning the operation is not completed as a single indivisible step. If an Out-of-Gas (OOG) exception occurs after the resources have been moved but before the state transition is finalized, the parent VM is left in a corrupted state where these critical resources are emptied or invalid. Despite this corrupted state, the parent VM continues execution due to gas isolation mechanisms, leading to unexpected behavior or denial of service within the smart contract's execution context. The vulnerability impacts the availability of the contract execution environment but does not compromise confidentiality or integrity. The CVSS v3.1 score is 7.5 (high severity), reflecting the network attack vector, low complexity, no privileges required, no user interaction, and unchanged scope. No patches or known exploits are currently available, indicating the need for proactive mitigation. The underlying CWE is CWE-1321, which relates to improper state handling in virtual machines or interpreters.

Potential Impact

The primary impact of CVE-2025-70956 is a denial of service condition within smart contracts running on the TON Virtual Machine. By corrupting the parent VM state during child VM initialization, the vulnerability can cause contracts to behave unpredictably or halt execution, disrupting blockchain operations dependent on these contracts. This can affect decentralized applications (dApps), financial transactions, and other services relying on TVM for execution integrity. Since the vulnerability does not affect confidentiality or integrity, data leakage or unauthorized modification is unlikely. However, the availability impact can undermine trust in the affected blockchain platform and cause financial or operational losses for organizations relying on uninterrupted smart contract execution. The ease of exploitation (no privileges or user interaction required) and remote attack vector increase the risk of automated attacks or exploitation attempts once the vulnerability becomes widely known. Organizations running nodes or developing smart contracts on TON must consider the risk of service disruption and potential cascading effects on dependent systems and users.

Mitigation Recommendations

To mitigate CVE-2025-70956, developers and operators of the TON Virtual Machine should implement atomic state transitions when moving resources between parent and child VMs. This can be achieved by redesigning the RUNVM instruction logic to ensure that resource transfer and state finalization occur as a single atomic operation, preventing partial state corruption if an OOG exception occurs. Additionally, introducing robust exception handling and rollback mechanisms to restore the parent VM state upon failure during child VM initialization will prevent corrupted states from persisting. Monitoring and alerting for OOG exceptions during contract execution can help detect exploitation attempts or abnormal behavior early. Smart contract developers should also design contracts to minimize gas exhaustion risks and test for edge cases involving resource transfers. Until official patches are released, organizations should consider restricting or closely monitoring contract deployments that utilize RUNVM instructions. Participation in the TON developer community and applying updates promptly once patches become available is critical. Finally, conducting thorough code audits focusing on VM state management and resource handling will reduce the risk of similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698f98d5c9e1ff5ad868bfb8

Added to database: 2/13/2026, 9:34:13 PM

Last enriched: 2/20/2026, 10:37:02 PM

Last updated: 2/21/2026, 12:18:54 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats