Description
NEMU (OpenXiangShan/NEMU) before v2025.12.r2 contains an improper instruction-validation flaw in its RISC-V Vector (RVV) decoder. The decoder does not correctly validate the funct3 field when decoding vsetvli/vsetivli/vsetvl, allowing certain invalid OP-V instruction encodings to be misinterpreted and executed as vset* configuration instructions rather than raising an illegal-instruction exception. This can be exploited by providing crafted RISC-V binaries to cause incorrect trap behavior, architectural state corruption/divergence, and potential denial of service in systems that rely on NEMU for correct execution or sandboxing.
Published: 2026-04-20
Score: n/a
EPSS: n/a
KEV: No
Impact: Denial of Service and state corruption
Action: Patch
AI Analysis

Impact

NEMU (OpenXiangShan/NEMU) before release v2025.12.r2 contains an improper instruction‑validation flaw in its RISC‑V Vector (RVV) decoder. The decoder fails to validate the funct3 field when decoding the vsetvli/vsetivli/vsetvl instructions, allowing certain malformed OP‑V instruction encodings to be interpreted as vset* configuration instructions instead of raising an illegal‑instruction exception. This misinterpretation permits the execution of unintended vector setting code, which can corrupt architectural state, trigger incorrect trap handling and lead to a crash or denial of service.

Affected Systems

The vulnerability affects NEMU (OpenXiangShan/NEMU) versions older than v2025.12.r2. No vendor identification beyond the NEMU project is available, and the flaw applies to all installations of the affected emulator that use the RVV decoder.

Risk and Exploitability

The CVSS score is not provided, and EPSS data is unavailable; the vulnerability is not listed in CISA KEV. Nevertheless, the flaw allows a maliciously crafted RISC‑V binary to be supplied to NEMU, which can then be executed and cause state corruption or a denial of service. The attack vector is likely local exploitation via controlled input to NEMU, but systems that expose NEMU as a service could be vulnerable to remote abuse. Given the potential for complete loss of emulator reliability, the risk is considered high, and prompt remediation is advised.

Generated by OpenCVE AI on April 20, 2026 at 20:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to NEMU v2025.12.r2 or any later release where the RVV decoder bug is fixed.
  • If an immediate upgrade is not possible, isolate NEMU from untrusted binaries, and pre‑validate or sanitize input to ensure only legal RVV encodings reach the decoder.
  • Monitor emulator log output for abnormal state changes or crashes, and consider disabling the vector extension in NEMU configuration if vector instructions are not required.

Generated by OpenCVE AI on April 20, 2026 at 20:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
Title Instruction Validation Flaw in NEMU's RISC-V Vector Decoder Allows Misinterpretation of Invalid Encodings
Weaknesses CWE-20

Mon, 20 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Description NEMU (OpenXiangShan/NEMU) before v2025.12.r2 contains an improper instruction-validation flaw in its RISC-V Vector (RVV) decoder. The decoder does not correctly validate the funct3 field when decoding vsetvli/vsetivli/vsetvl, allowing certain invalid OP-V instruction encodings to be misinterpreted and executed as vset* configuration instructions rather than raising an illegal-instruction exception. This can be exploited by providing crafted RISC-V binaries to cause incorrect trap behavior, architectural state corruption/divergence, and potential denial of service in systems that rely on NEMU for correct execution or sandboxing.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-20T19:24:42.410Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-29645

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-20T20:16:48.303

Modified: 2026-04-20T20:16:48.303

Link: CVE-2026-29645

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T20:45:16Z

Weaknesses