Description
In OpenXiangShan NEMU, insufficient Smstateen permission enforcement allows lower-privileged code to access IMSIC state via stopei/vstopei CSRs even when mstateen0.IMSIC is cleared, potentially enabling cross-context information leakage or disruption of interrupt handling.
Published: 2026-04-20
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure and Potential Interrupt Handling Disruption
Action: Assess Impact
AI Analysis

Impact

This vulnerability stems from an insufficient enforcement of Smstateen permission checks in OpenXiangShan NEMU. When the mstateen0.IMSIC bit is cleared, lower‑privileged code can still read the IMSIC state through the stopei and vstopei CSRs, enabling an attacker to gather information about other contexts’ interrupt states or to interfere with interrupt handling, thereby compromising both confidentiality and availability.

Affected Systems

OpenXiangShan NEMU emulates RISC‑V ISA and implements the Smstateen mechanism to guard access to privileged CSRs. The flaw exists in any NEMU build that uses the described SMstateen check without the fix; no version range is specified in the CNA data, so all current releases that implement the unpatched logic are potentially affected.

Risk and Exploitability

The CVSS score is 6.5, reflecting moderate severity. The EPSS score is less than 1%, indicating a low probability of exploitation. Because the flaw requires an attacker to run low‑privileged code that can access the stopei/vstopei CSRs, it is typically a local privilege escalation scenario. When leveraged, the vulnerability can leak cross‑context interrupt state information or disrupt interrupt handling, compromising confidentiality and availability in multi‑context emulator environments. The vulnerability is not listed in CISA’s KEV catalog, suggesting no confirmed exploitation yet, but the potential impact warrants careful mitigation.

Generated by OpenCVE AI on April 22, 2026 at 07:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest NEMU release that includes the Smstateen permission check patch as indicated in the upstream pull request
  • If a patched version cannot be obtained, modify the emulator to enforce that stopei and vstopei CSRs are only executable when the mstateen0.IMSIC bit is set, effectively rejecting access from lower‑privileged contexts
  • Where possible, disable IMSIC functionality or partition it per virtual context to prevent cross‑context data exposure, and restrict untrusted code from accessing privileged CSR space

Generated by OpenCVE AI on April 22, 2026 at 07:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Openxiangshan
Openxiangshan nemu
Vendors & Products Openxiangshan
Openxiangshan nemu

Wed, 22 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Title OpenXiangShan NEMU Cross-Context IMSIC State Leakage

Wed, 22 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Unprotected Stopei CSRs in OpenXiangShan NEMU
Weaknesses CWE-200
CWE-284

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-269
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 21 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Unprotected Stopei CSRs in OpenXiangShan NEMU
Weaknesses CWE-200
CWE-284

Mon, 20 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
Description In OpenXiangShan NEMU, insufficient Smstateen permission enforcement allows lower-privileged code to access IMSIC state via stopei/vstopei CSRs even when mstateen0.IMSIC is cleared, potentially enabling cross-context information leakage or disruption of interrupt handling.
References

Subscriptions

Openxiangshan Nemu
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-21T19:50:43.685Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-29647

cve-icon Vulnrichment

Updated: 2026-04-21T18:25:27.685Z

cve-icon NVD

Status : Deferred

Published: 2026-04-20T21:16:19.637

Modified: 2026-04-21T20:16:40.723

Link: CVE-2026-29647

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T09:26:44Z

Weaknesses