CVE-2025-70954

7.5 HIGH

📋 TL;DR

A Null Pointer Dereference vulnerability in TON Blockchain's TVM allows attackers to crash validator nodes by sending malicious transactions. This causes Denial of Service (DoS) affecting blockchain network availability. All TON Blockchain validator nodes running vulnerable versions are affected.

💻 Affected Systems

Products:
  • TON Blockchain
Versions: All versions before v2025.06
Operating Systems: All operating systems running TON Blockchain
Default Config Vulnerable: ⚠️ Yes
Notes: Only validator nodes processing transactions are affected; regular wallet nodes are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Massive network disruption with multiple validator nodes crashing simultaneously, potentially halting block production and transaction processing across the entire TON blockchain.

🟠

Likely Case

Targeted DoS attacks against specific validator nodes causing temporary unavailability and potential loss of staking rewards for affected validators.

🟢

If Mitigated

Isolated node crashes with minimal network impact due to validator redundancy and quick patching.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting specific malicious transactions targeting the INMSGPARAM instruction.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2025.06

Vendor Advisory: https://github.com/ton-blockchain/ton/releases/tag/v2025.06

Restart Required: Yes

Instructions:

1. Stop TON validator service. 2. Backup configuration and data. 3. Update to v2025.06 using official release. 4. Restart validator service.

🔧 Temporary Workarounds

Transaction Filtering

all

Implement custom transaction filtering to block suspicious INMSGPARAM instructions

🧯 If You Can't Patch

  • Implement network-level DDoS protection to filter malicious transactions
  • Increase validator redundancy to maintain network availability during targeted attacks

🔍 How to Verify

Check if Vulnerable:

Check TON version with: ton-node --version

Check Version:

ton-node --version

Verify Fix Applied:

Verify version is v2025.06 or later and monitor for segmentation faults

📡 Detection & Monitoring

Log Indicators:

  • Segmentation fault errors in validator logs
  • Unexpected node crashes
  • INMSGPARAM instruction failures

Network Indicators:

  • Unusual transaction patterns targeting specific opcodes
  • Sudden validator node disconnections

SIEM Query:

source="ton-validator.log" AND ("segmentation fault" OR "null pointer" OR "INMSGPARAM")

🔗 References

📤 Share & Export