Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8774: Observable Timing Discrepancy in riscv-boom SonicBOOM

0
Low
VulnerabilityCVE-2025-8774cvecve-2025-8774
Published: Sat Aug 09 2025 (08/09/2025, 20:32:05 UTC)
Source: CVE Database V5
Vendor/Project: riscv-boom
Product: SonicBOOM

Description

A vulnerability has been found in riscv-boom SonicBOOM up to 2.2.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component L1 Data Cache Handler. The manipulation leads to observable timing discrepancy. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/17/2025, 01:00:36 UTC

Technical Analysis

CVE-2025-8774 is a vulnerability identified in the riscv-boom SonicBOOM processor core, specifically affecting versions 2.2.0 through 2.2.3. The vulnerability resides in an unspecified functionality within the L1 Data Cache Handler component. The core issue is an observable timing discrepancy that can be exploited by an attacker with local access. This timing discrepancy likely allows an attacker to infer sensitive information by measuring variations in cache access times, a classic side-channel attack vector. However, the attack complexity is considered high, and exploitation is difficult, requiring local privileges and precise timing measurements. No user interaction is needed, and the vulnerability does not affect confidentiality, integrity, or availability directly but could potentially leak sensitive data through side-channel analysis. The vendor has not responded to the disclosure, and no patches or mitigations have been published yet. The CVSS v4.0 base score is 2.0, indicating a low severity rating, reflecting the limited impact and high attack complexity. No known exploits are currently in the wild.

Potential Impact

For European organizations, the impact of this vulnerability is generally low due to the high complexity of exploitation and the requirement for local access. However, organizations using riscv-boom SonicBOOM cores in sensitive embedded systems or critical infrastructure devices could face risks of side-channel data leakage, potentially exposing cryptographic keys or other sensitive information. This is particularly relevant for sectors such as telecommunications, defense, and critical infrastructure where RISC-V processors might be deployed in secure environments. The lack of vendor response and absence of patches increases the risk window. Additionally, the vulnerability could be leveraged by insider threats or attackers who have already gained limited local access, escalating their ability to extract sensitive data. Overall, the direct impact on confidentiality is limited but should not be ignored in high-security environments.

Mitigation Recommendations

Given the absence of patches, European organizations should implement strict access controls to prevent unauthorized local access to systems running affected riscv-boom SonicBOOM cores. Employ hardware and software-based isolation techniques to limit the ability of untrusted code to execute on the same processor or share cache resources. Monitoring and anomaly detection for unusual timing measurement activities could help detect exploitation attempts. For new deployments, consider using updated or alternative processor cores that have addressed this vulnerability. Additionally, organizations should engage with vendors and the open-source community to track any forthcoming patches or mitigations. Where possible, apply microarchitectural mitigations such as cache partitioning or flushing to reduce timing side-channel leakage. Finally, conduct security audits focusing on side-channel risks in embedded systems using this processor.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-08T20:24:10.093Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6897e8eaad5a09ad000f48e1

Added to database: 8/10/2025, 12:33:46 AM

Last enriched: 8/17/2025, 1:00:36 AM

Last updated: 11/9/2025, 8:52:29 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats