A vulnerability was discovered in RISC-V Rocket-Chip v1.6 and before implementation where the SRET (Supervisor-mode Exception Return) instruction fails to correctly transition the processor's privilege level. Instead of downgrading from Machine-mode (M-mode) to Supervisor-mode (S-mode) as specified by the sstatus.SPP bit, the processor incorrectly remains in M-mode, leading to a critical privilege retention vulnerability.

Subscriptions

Vendors Products
Chipsalliance Subscribe
Rocket-chip Subscribe
Rocketchip Subscribe

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 05 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Chipsalliance rocketchip
CPEs cpe:2.3:a:chipsalliance:rocketchip:*:*:*:*:*:*:*:*
Vendors & Products Chipsalliance rocketchip

Wed, 12 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-266
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 12 Nov 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Chipsalliance
Chipsalliance rocket-chip
Vendors & Products Chipsalliance
Chipsalliance rocket-chip

Mon, 10 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was discovered in RISC-V Rocket-Chip v1.6 and before implementation where the SRET (Supervisor-mode Exception Return) instruction fails to correctly transition the processor's privilege level. Instead of downgrading from Machine-mode (M-mode) to Supervisor-mode (S-mode) as specified by the sstatus.SPP bit, the processor incorrectly remains in M-mode, leading to a critical privilege retention vulnerability.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-12T20:39:11.448Z

Reserved: 2025-10-27T00:00:00.000Z

Link: CVE-2025-63384

cve-icon Vulnrichment

Updated: 2025-11-12T20:38:58.424Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-10T20:15:49.013

Modified: 2026-02-05T15:25:19.137

Link: CVE-2025-63384

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-12T12:50:00Z

Weaknesses