A vulnerability was discovered in RISC-V Rocket-Chip v1.6 and before implementation where the SRET (Supervisor-mode Exception Return) instruction fails to correctly transition the processor's privilege level. Instead of downgrading from Machine-mode (M-mode) to Supervisor-mode (S-mode) as specified by the sstatus.SPP bit, the processor incorrectly remains in M-mode, leading to a critical privilege retention vulnerability.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 10 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was discovered in RISC-V Rocket-Chip v1.6 and before implementation where the SRET (Supervisor-mode Exception Return) instruction fails to correctly transition the processor's privilege level. Instead of downgrading from Machine-mode (M-mode) to Supervisor-mode (S-mode) as specified by the sstatus.SPP bit, the processor incorrectly remains in M-mode, leading to a critical privilege retention vulnerability.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-10T20:07:29.692Z

Reserved: 2025-10-27T00:00:00.000Z

Link: CVE-2025-63384

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-10T20:15:49.013

Modified: 2025-11-10T20:15:49.013

Link: CVE-2025-63384

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.