CVE-2025-70956
Unknown Unknown - Not Provided
State Pollution Vulnerability in TON VM RUNVM Causes DoS

Publication date: 2026-02-13

Last updated on: 2026-02-17

Assigner: MITRE

Description
A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) before v2025.04. The issue exists in the RUNVM instruction logic (VmState::run_child_vm), which is responsible for initializing child virtual machines. The operation moves critical resources (specifically libraries and log) from the parent state to a new child state in a non-atomic manner. If an Out-of-Gas (OOG) exception occurs after resources are moved but before the state transition is finalized, the parent VM retains a corrupted state where these resources are emptied/invalid. Because RUNVM supports gas isolation, the parent VM continues execution with this corrupted state, leading to unexpected behavior or denial of service within the contract's context.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-13
Last Modified
2026-02-17
Generated
2026-05-07
AI Q&A
2026-02-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ton virtual_machine 2025.04
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1321 The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a State Pollution issue in the TON Virtual Machine (TVM) before version 2025.04. It occurs in the RUNVM instruction logic, which initializes child virtual machines by moving critical resources such as libraries and logs from the parent VM state to the child VM state. The problem arises because this resource transfer is not atomic. If an Out-of-Gas (OOG) exception happens after the resources are moved but before the state transition is completed, the parent VM ends up with a corrupted state where these resources are missing or invalid.

As a result, the parent VM continues execution with this corrupted state due to gas isolation support in RUNVM, which can cause unexpected behavior or denial of service within the contract's context.


How can this vulnerability impact me? :

This vulnerability can impact you by causing unexpected behavior or denial of service within the context of smart contracts running on the TON Virtual Machine. Specifically, if the parent VM state becomes corrupted due to the non-atomic resource transfer and an Out-of-Gas exception, the contract may fail to execute correctly or may stop functioning altogether.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart