Improper Validation of Integrity Check Value Affecting sp1-recursion-circuit-v2 package, versions *


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-RUST-SP1RECURSIONCIRCUITV2-8366352
  • published 10 Nov 2024
  • disclosed 8 Nov 2024
  • credit Unknown

Introduced: 8 Nov 2024

New CVE NOT AVAILABLE CWE-354 Open this link in a new tab

How to fix?

There is no fixed version for sp1-recursion-circuit-v2.

Overview

sp1-recursion-circuit-v2 is a performant, 100% open-source, contributor-friendly zkVM

Affected versions of this package are vulnerable to Improper Validation of Integrity Check Value during proof generation, by not sufficiently observing the cumulative sumof the permutation argument sent to the verifier when sampling zeta. An attacker with impractically extensive compute power and deep knowledge of cryptographic attacks may be able to manipulate prover behvaior.

References

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
6.3 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    Present
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Confidentiality (VC)
    None
  • Integrity (VI)
    Low
  • Availability (VA)
    None
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None