CVE-2025-61588

N/A Unknown

📋 TL;DR

This vulnerability in RISC Zero's zkVM platform allows a malicious host to write arbitrary data to guest memory locations when the guest calls sys_read. This can lead to arbitrary code execution within the guest, compromising the soundness guarantees of zero-knowledge proofs. All guest programs built with affected versions are vulnerable.

💻 Affected Systems

Products:
  • risc0-zkvm-platform
  • risc0-aggregation
  • risc0-zkos-v1compat
  • risc0-zkvm
Versions: risc0-zkvm-platform ≤2.0.2, risc0-aggregation <0.9, risc0-zkos-v1compat <2.1.0, risc0-zkvm 3.0.0-rc.1 to 3.0.1
Operating Systems: All platforms running RISC Zero software
Default Config Vulnerable: ⚠️ Yes
Notes: All guest programs built with affected versions are vulnerable as sys_read is fundamental to guest-host communication.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of guest program integrity, allowing arbitrary code execution that could steal sensitive data, manipulate proof computations, or disrupt system operations.

🟠

Likely Case

Malicious hosts exploiting the vulnerability to manipulate guest computations, potentially leading to incorrect zero-knowledge proof results or data leakage.

🟢

If Mitigated

Limited impact if proper host authentication and isolation controls are in place, though the fundamental vulnerability remains.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires the attacker to control the host environment or compromise the host system. The vulnerability is in the guest-host communication mechanism.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: risc0-zkvm-platform 2.1.0, risc0-zkos-v1compat 2.1.0, risc0-aggregation 0.9, risc0-zkvm 2.3.2 or 3.0.3

Vendor Advisory: https://github.com/risc0/risc0/security/advisories/GHSA-jqq4-c7wq-36h7

Restart Required: Yes

Instructions:

1. Identify which RISC Zero packages you're using. 2. Update to patched versions: risc0-zkvm-platform to 2.1.0+, risc0-zkos-v1compat to 2.1.0+, risc0-aggregation to 0.9+, risc0-zkvm to 2.3.2+ or 3.0.3+. 3. Rebuild and redeploy all guest programs with updated dependencies.

🔧 Temporary Workarounds

Host Environment Hardening

all

Implement strict access controls and monitoring on host systems to prevent unauthorized access to the RISC Zero host environment.

Input Validation Layer

all

Add additional input validation and sanitization layers between guest sys_read calls and host responses.

🧯 If You Can't Patch

  • Isolate RISC Zero host environments from untrusted networks and users.
  • Implement strict monitoring and alerting for unusual guest program behavior or memory access patterns.

🔍 How to Verify

Check if Vulnerable:

Check package versions in your Cargo.toml or dependency files for affected versions of risc0-zkvm-platform, risc0-aggregation, risc0-zkos-v1compat, or risc0-zkvm.

Check Version:

cargo tree | grep risc0 OR check Cargo.toml/Cargo.lock files for risc0 dependencies

Verify Fix Applied:

Verify updated package versions in Cargo.lock or dependency manifests match patched versions: risc0-zkvm-platform ≥2.1.0, risc0-aggregation ≥0.9, risc0-zkos-v1compat ≥2.1.0, risc0-zkvm ≥2.3.2 or ≥3.0.3.

📡 Detection & Monitoring

Log Indicators:

  • Unusual memory access patterns in guest programs
  • Multiple failed sys_read operations
  • Guest program crashes or unexpected behavior

Network Indicators:

  • Unusual network traffic to/from RISC Zero host systems
  • Unexpected data transfers during proof generation

SIEM Query:

Search for process executions containing 'risc0' with abnormal memory access patterns or unexpected sys_read operations

🔗 References

📤 Share & Export