No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 18 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-674 | |
| Metrics |
cvssV3_1
|
Tue, 17 Feb 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ton-blockchain
Ton-blockchain ton |
|
| Vendors & Products |
Ton-blockchain
Ton-blockchain ton |
Fri, 13 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Stack Overflow vulnerability was discovered in the TON Virtual Machine (TVM) before v2024.10. The vulnerability stems from the improper handling of vmstate and continuation jump instructions, which allow for continuous dynamic tail calls. An attacker can exploit this by crafting a smart contract with deeply nested jump logic. Even within permissible gas limits, this nested execution exhausts the host process's stack space, causing the validator node to crash. This results in a Denial of Service (DoS) for the TON blockchain network. | |
| References |
|
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-18T14:33:54.465Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-70955
Updated: 2026-02-18T14:33:49.177Z
Status : Awaiting Analysis
Published: 2026-02-13T22:16:10.170
Modified: 2026-02-18T17:52:44.520
Link: CVE-2025-70955
No data.
OpenCVE Enrichment
Updated: 2026-02-17T08:50:10Z