GHSA-RJR4-V43M-PXQ6
Vulnerability from github – Published: 2026-01-21 22:52 – Updated: 2026-01-22 13:40
VLAI?
Summary
Triton VM Soundness Vulnerability due to Improper Sampling of Randomness
Details
In affected versions of Triton VM, the verifier failed to correctly sample randomness in the FRI sub-protocol.
Malicious provers can exploit this to craft proofs for arbitrary statements that this verifier accepts as valid, undermining soundness.
Protocols that rely on proofs and the supplied verifier of the affected versions of Triton VM are completely broken. Protocols implementing their own verifier might be unaffected.
The flaw was corrected in commit 3a045d63, where the relevant randomness is sampled correctly.
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "triton-vm"
},
"ranges": [
{
"events": [
{
"introduced": "0.41.0"
},
{
"fixed": "2.0.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-330"
],
"github_reviewed": true,
"github_reviewed_at": "2026-01-21T22:52:56Z",
"nvd_published_at": null,
"severity": "LOW"
},
"details": "In affected versions of Triton VM, the verifier failed to correctly sample randomness in the FRI sub-protocol.\n\nMalicious provers can exploit this to craft proofs for arbitrary statements that this verifier accepts as valid, undermining soundness.\n\nProtocols that rely on proofs and the supplied verifier of the affected versions of Triton VM are completely broken. Protocols implementing their own verifier might be unaffected.\n\nThe flaw was corrected in commit 3a045d63, where the relevant randomness is sampled correctly.",
"id": "GHSA-rjr4-v43m-pxq6",
"modified": "2026-01-22T13:40:29Z",
"published": "2026-01-21T22:52:56Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/TritonVM/triton-vm/commit/3a045d636e97bb2eb628671db0001aa665c19dd8"
},
{
"type": "PACKAGE",
"url": "https://github.com/TritonVM/triton-vm"
},
{
"type": "WEB",
"url": "https://github.com/TritonVM/triton-vm/releases/tag/v2.0.0"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2026-0004.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U",
"type": "CVSS_V4"
}
],
"summary": "Triton VM Soundness Vulnerability due to Improper Sampling of Randomness"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…