CVE-2025-29072

HIGH

Nethermind Juno < 0.12.5 - Integer Overflow

Title source: rule
STIX 2.1

Description

An integer overflow in Nethermind Juno before v.12.05 within the Sierra bytecode decompression logic within the "cairo-lang-starknet-classes" library could allow remote attackers to trigger an infinite loop (and high CPU usage) by submitting a malicious Declare v2/v3 transaction. This results in a denial-of-service condition for affected Starknet full-node implementations.

Scores

CVSS v3 7.5
EPSS 0.0114
EPSS Percentile 78.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-190
Status published
Products (2)
nethermind/juno < 0.12.5
NethermindEth/juno 0 - 0.12.5Go
Published Mar 27, 2025
Tracked Since Feb 18, 2026