CVE-2025-70957

7.5 HIGH

📋 TL;DR

This CVE describes a Denial of Service vulnerability in TON Lite Server where attackers can inject malicious Continuation objects into locally executed 'get methods'. This allows attackers to consume excessive CPU resources with minimal gas costs, monopolizing processing power and reducing throughput for legitimate users. Anyone running vulnerable TON Lite Server versions is affected.

💻 Affected Systems

Products:
  • TON Lite Server
Versions: All versions before v2024.09
Operating Systems: All platforms running TON Lite Server
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the TVM (TON Virtual Machine) component handling external arguments in locally executed get methods.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for all legitimate users, rendering the Lite Server gateway unusable and disrupting blockchain operations.

🟠

Likely Case

Significant performance degradation and reduced throughput for legitimate users, potentially causing transaction delays and service disruption.

🟢

If Mitigated

Minimal impact with proper patching and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of TVM internals and Continuation objects, but the vulnerability is in default configurations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2024.09 and later

Vendor Advisory: https://github.com/ton-blockchain/ton/commit/e35b34de22109596a54d1357dcce92d63002ba95

Restart Required: No

Instructions:

1. Update TON Lite Server to version v2024.09 or later. 2. Verify the commit e35b34de22109596a54d1357dcce92d63002ba95 is included. 3. No restart required as this is a software update.

🔧 Temporary Workarounds

Rate Limiting

all

Implement rate limiting on get method calls to reduce potential DoS impact

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for external arguments
  • Deploy network-level protections and monitoring for abnormal CPU usage patterns

🔍 How to Verify

Check if Vulnerable:

Check if TON Lite Server version is earlier than v2024.09

Check Version:

Check TON Lite Server documentation or build information for version details

Verify Fix Applied:

Verify version is v2024.09 or later and commit e35b34de22109596a54d1357dcce92d63002ba95 is present

📡 Detection & Monitoring

Log Indicators:

  • Unusually high CPU usage patterns
  • Abnormal get method execution times
  • Spikes in virtual gas consumption

Network Indicators:

  • Increased latency in gateway responses
  • Reduced throughput for legitimate users

SIEM Query:

Search for patterns of excessive CPU usage correlated with get method executions

🔗 References

📤 Share & Export