Description
An integer overflow in Nethermind Juno before v.12.05 within the Sierra bytecode decompression logic within the "cairo-lang-starknet-classes" library could allow remote attackers to trigger an infinite loop (and high CPU usage) by submitting a malicious Declare v2/v3 transaction. This results in a denial-of-service condition for affected Starknet full-node implementations.
References (2)
Core 2
Scores
CVSS v3
7.5
EPSS
0.0114
EPSS Percentile
78.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-190
Status
published
Products (2)
nethermind/juno
< 0.12.5
NethermindEth/juno
0 - 0.12.5Go
Published
Mar 27, 2025
Tracked Since
Feb 18, 2026