CVE-2026-29644: n/a
CVE-2026-29644 is a vulnerability in the XiangShan open-source high-performance RISC-V processor related to improper gating of its distributed CSR write-enable path. This flaw allows illegal CSR write attempts to modify custom Physical Memory Attribute (PMA) CSR state, despite the RISC-V privileged specification requiring an illegal-instruction exception for such accesses. Local attackers with code execution on the core may exploit this to tamper with memory-attribute enforcement, potentially causing privilege escalation, information disclosure, or denial of service depending on platform security enforcement. No patch or official remediation guidance is currently available. Exploits in the wild are not known at this time.
AI Analysis
Technical Summary
The XiangShan RISC-V processor commit edb1dfaf7d290ae99724594507dc46c2c2125384 contains a vulnerability where improper gating of the distributed CSR write-enable path permits illegal CSR write attempts to alter the custom PMA CSR state. Although the RISC-V privileged specification mandates an illegal-instruction exception for illegal CSR accesses, affected versions of XiangShan may still propagate these writes to replicated PMA configuration state. This can be exploited by local attackers with code execution on the core to manipulate memory attribute enforcement, potentially impacting platform security and isolation boundaries. The vulnerability affects the processor's handling of privileged instructions related to PMA configuration and may lead to privilege escalation, information disclosure, or denial of service depending on system integration and enforcement mechanisms. There is no CVSS score or vendor advisory specifying remediation or patch availability.
Potential Impact
The vulnerability allows local attackers with code execution on the affected XiangShan processor core to tamper with the Physical Memory Attribute CSR state via illegal CSR writes that bypass expected exceptions. This can undermine memory attribute enforcement, potentially resulting in privilege escalation, unauthorized information disclosure, or denial of service. The actual impact depends on how the PMA enforces platform security and isolation boundaries in the specific system integration. No known exploits are reported in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. No official fix or temporary mitigation is currently documented. Until a patch is available, system integrators and users should be aware of the risk posed by local code execution and consider restricting untrusted code execution privileges on affected XiangShan cores.
CVE-2026-29644: n/a
Description
CVE-2026-29644 is a vulnerability in the XiangShan open-source high-performance RISC-V processor related to improper gating of its distributed CSR write-enable path. This flaw allows illegal CSR write attempts to modify custom Physical Memory Attribute (PMA) CSR state, despite the RISC-V privileged specification requiring an illegal-instruction exception for such accesses. Local attackers with code execution on the core may exploit this to tamper with memory-attribute enforcement, potentially causing privilege escalation, information disclosure, or denial of service depending on platform security enforcement. No patch or official remediation guidance is currently available. Exploits in the wild are not known at this time.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The XiangShan RISC-V processor commit edb1dfaf7d290ae99724594507dc46c2c2125384 contains a vulnerability where improper gating of the distributed CSR write-enable path permits illegal CSR write attempts to alter the custom PMA CSR state. Although the RISC-V privileged specification mandates an illegal-instruction exception for illegal CSR accesses, affected versions of XiangShan may still propagate these writes to replicated PMA configuration state. This can be exploited by local attackers with code execution on the core to manipulate memory attribute enforcement, potentially impacting platform security and isolation boundaries. The vulnerability affects the processor's handling of privileged instructions related to PMA configuration and may lead to privilege escalation, information disclosure, or denial of service depending on system integration and enforcement mechanisms. There is no CVSS score or vendor advisory specifying remediation or patch availability.
Potential Impact
The vulnerability allows local attackers with code execution on the affected XiangShan processor core to tamper with the Physical Memory Attribute CSR state via illegal CSR writes that bypass expected exceptions. This can undermine memory attribute enforcement, potentially resulting in privilege escalation, unauthorized information disclosure, or denial of service. The actual impact depends on how the PMA enforces platform security and isolation boundaries in the specific system integration. No known exploits are reported in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. No official fix or temporary mitigation is currently documented. Until a patch is available, system integrators and users should be aware of the risk posed by local code execution and consider restricting untrusted code execution privileges on affected XiangShan cores.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-03-04T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69e78a2b19fe3cd2cdda97f1
Added to database: 4/21/2026, 2:31:07 PM
Last enriched: 4/21/2026, 2:46:23 PM
Last updated: 4/21/2026, 3:48:32 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.