Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70956: n/a

0
High
VulnerabilityCVE-2025-70956cvecve-2025-70956
Published: Fri Feb 13 2026 (02/13/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) before v2025.04. The issue exists in the RUNVM instruction logic (VmState::run_child_vm), which is responsible for initializing child virtual machines. The operation moves critical resources (specifically libraries and log) from the parent state to a new child state in a non-atomic manner. If an Out-of-Gas (OOG) exception occurs after resources are moved but before the state transition is finalized, the parent VM retains a corrupted state where these resources are emptied/invalid. Because RUNVM supports gas isolation, the parent VM continues execution with this corrupted state, leading to unexpected behavior or denial of service within the contract's context.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/20/2026, 22:37:02 UTC

Technical Analysis

CVE-2025-70956 identifies a state pollution vulnerability within the TON Virtual Machine (TVM) prior to version 2025.04. The vulnerability is rooted in the RUNVM instruction logic, specifically in the VmState::run_child_vm function, which initializes child virtual machines by transferring critical resources such as libraries and logs from the parent VM state to the child VM state. This transfer is performed in a non-atomic manner, meaning the operation is not completed as a single indivisible step. If an Out-of-Gas (OOG) exception occurs after the resources have been moved but before the state transition is finalized, the parent VM is left in a corrupted state where these critical resources are emptied or invalid. Despite this corrupted state, the parent VM continues execution due to gas isolation mechanisms, leading to unexpected behavior or denial of service within the smart contract's execution context. The vulnerability impacts the availability of the contract execution environment but does not compromise confidentiality or integrity. The CVSS v3.1 score is 7.5 (high severity), reflecting the network attack vector, low complexity, no privileges required, no user interaction, and unchanged scope. No patches or known exploits are currently available, indicating the need for proactive mitigation. The underlying CWE is CWE-1321, which relates to improper state handling in virtual machines or interpreters.

Potential Impact

The primary impact of CVE-2025-70956 is a denial of service condition within smart contracts running on the TON Virtual Machine. By corrupting the parent VM state during child VM initialization, the vulnerability can cause contracts to behave unpredictably or halt execution, disrupting blockchain operations dependent on these contracts. This can affect decentralized applications (dApps), financial transactions, and other services relying on TVM for execution integrity. Since the vulnerability does not affect confidentiality or integrity, data leakage or unauthorized modification is unlikely. However, the availability impact can undermine trust in the affected blockchain platform and cause financial or operational losses for organizations relying on uninterrupted smart contract execution. The ease of exploitation (no privileges or user interaction required) and remote attack vector increase the risk of automated attacks or exploitation attempts once the vulnerability becomes widely known. Organizations running nodes or developing smart contracts on TON must consider the risk of service disruption and potential cascading effects on dependent systems and users.

Mitigation Recommendations

To mitigate CVE-2025-70956, developers and operators of the TON Virtual Machine should implement atomic state transitions when moving resources between parent and child VMs. This can be achieved by redesigning the RUNVM instruction logic to ensure that resource transfer and state finalization occur as a single atomic operation, preventing partial state corruption if an OOG exception occurs. Additionally, introducing robust exception handling and rollback mechanisms to restore the parent VM state upon failure during child VM initialization will prevent corrupted states from persisting. Monitoring and alerting for OOG exceptions during contract execution can help detect exploitation attempts or abnormal behavior early. Smart contract developers should also design contracts to minimize gas exhaustion risks and test for edge cases involving resource transfers. Until official patches are released, organizations should consider restricting or closely monitoring contract deployments that utilize RUNVM instructions. Participation in the TON developer community and applying updates promptly once patches become available is critical. Finally, conducting thorough code audits focusing on VM state management and resource handling will reduce the risk of similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698f98d5c9e1ff5ad868bfb8

Added to database: 2/13/2026, 9:34:13 PM

Last enriched: 2/20/2026, 10:37:02 PM

Last updated: 4/6/2026, 11:32:21 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses