CVE-2025-56301
BaseFortify
Publication date: 2025-09-30
Last updated on: 2025-10-17
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| chipsalliance | rocket-chip | 2025-01-29 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1281 | Specific combinations of processor instructions lead to undesirable behavior such as locking the processor until a hard reset performed. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Chipsalliance Rocket-Chip's Control and Status Register (CSR) logic. It involves a flawed interaction between exception handling and the MRET (machine return) instruction. Specifically, when an exception is triggered during the execution of the MRET instruction, the exception handling and exception return mechanisms activate simultaneously, causing conflicting updates to the CSR. This can corrupt exception handling and privilege state transitions, leading to faulty trap behavior and potentially triggering an Instruction Access Fault when MRET is executed in machine mode outside of an exception state.
How can this vulnerability impact me? :
The vulnerability can lead to corruption of exception handling and privilege state transitions in the affected system. This may cause unexpected or faulty trap behavior, potentially destabilizing the system or allowing attackers to interfere with the normal control flow and privilege levels. Such corruption could be exploited to bypass security mechanisms or cause denial of service by triggering faults during critical operations.