Vulnerability Description
An integer overflow in Nethermind Juno before v.12.05 within the Sierra bytecode decompression logic within the "cairo-lang-starknet-classes" library could allow remote attackers to trigger an infinite loop (and high CPU usage) by submitting a malicious Declare v2/v3 transaction. This results in a denial-of-service condition for affected Starknet full-node implementations.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nethermind | Juno | < 0.12.5 |
Related Weaknesses (CWE)
References
- https://community.starknet.io/t/starknet-security-update-potential-full-node-vulThird Party Advisory
- https://github.com/NethermindEth/juno/commit/51074875941aa111c5dd2b41f2ec890a4a1Patch
FAQ
What is CVE-2025-29072?
CVE-2025-29072 is a vulnerability with a CVSS score of 7.5 (HIGH). An integer overflow in Nethermind Juno before v.12.05 within the Sierra bytecode decompression logic within the "cairo-lang-starknet-classes" library could allow remote attackers to trigger an infinit...
How severe is CVE-2025-29072?
CVE-2025-29072 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-29072?
Check the references section above for vendor advisories and patch information. Affected products include: Nethermind Juno.