CVE-2025-29072:
Nethermind Juno Potential Denial of Service (DoS) via Integer Overflow
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.37505%
CWE
Published
3/27/2025
Updated
3/28/2025
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/NethermindEth/juno | go | < 0.12.5 | 0.12.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The core vulnerability manifests in two layers:
- The CasmContractClass::from_contract_class function (from cairo-lang-starknet-classes) contains integer operations vulnerable to overflow when compiled without overflow-checks=true. This is evidenced by Juno adding 'overflow-checks = true' in their Cargo.toml.
- The compileSierraToCasm function in Juno's FFI layer directly invoked this vulnerable method with maximum usize values (usize::MAX) and no panic handling pre-patch, as shown by the added panic::catch_unwind in the diff. This function processes raw transaction input, making it the exploitation entry point. Runtime detection would observe both functions in stack traces: the Go/C boundary through compileSierraToCasm, followed by the decompression logic in from_contract_class during attack payload processing.