{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T18:54:23.369","vulnerabilities":[{"cve":{"id":"CVE-2025-70954","sourceIdentifier":"cve@mitre.org","published":"2026-02-13T22:16:10.047","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specific pointer is null before accessing it. By sending a malicious transaction or smart contract, an attacker can trigger this null pointer dereference, causing the validator node process to crash (segmentation fault). This results in a Denial of Service (DoS) affecting the availability of the entire blockchain network."},{"lang":"es","value":"Una vulnerabilidad de desreferencia de puntero nulo existe en la Máquina Virtual TON (TVM) dentro de la cadena de bloques TON antes de la v2025.06. El problema se encuentra en la lógica de ejecución de la instrucción INMSGPARAM, donde el programa no valida si un puntero específico es nulo antes de acceder a él. Al enviar una transacción maliciosa o un contrato inteligente, un atacante puede desencadenar esta desreferencia de puntero nulo, provocando que el proceso del nodo validador falle (fallo de segmentación). Esto resulta en una Denegación de Servicio (DoS) que afecta la disponibilidad de toda la red de cadena de bloques."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-476"}]}],"references":[{"url":"https://gist.github.com/Lucian-code233/04940a264cab50732cc07fd991749226","source":"cve@mitre.org"},{"url":"https://github.com/ton-blockchain/ton/commit/9e5109d56bc4f2345a00b2271c3711103841b799","source":"cve@mitre.org"},{"url":"https://github.com/ton-blockchain/ton/releases/tag/v2025.06#:~:text=AArayz%2C%20wy666444%2C%20Robinlzw%2C%20Lucian-code233","source":"cve@mitre.org"},{"url":"https://mp.weixin.qq.com/s/IbRKrCKdMyIi-azkuqOOvg","source":"cve@mitre.org"},{"url":"https://www.tonbit.xyz/blog/post/TonBit-Discovers-Critical-Vulnerability-on-TON-Virtual-Machine-for-the-Third-Time-Once-Again-Receiving-Official-Recognition-from-the-TON-Team.html","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}}]}