CVE-2025-54873 is a low severity vulnerability with a CVSS score of 0.0. No known exploits currently, and patches are available.
Very low probability of exploitation
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
Two issues were found: For some inputs to signed integer division, the circuit allowed two outputs, only one of which was valid. Additionally, the result of division by zero was underconstrained.
This vulnerability was identified using the Picus tool from Veridise.
Impacted on-chain verifiers have already been disabled via the estop mechanism outlined in the Verifier Management Design.
We recommend all impacted users upgrade as soon as possible.
Rust applications using the risc0-zkvm crate at versions < 2.2 should upgrade to version 2.2.0 or later.
Smart contract applications using the official RISC Zero Verifier Router do not need to take any action: zkVM version 2.2 is active on all official routers, and version 2.1 has been disabled.
Smart contract applications not using the verifier router should update their contracts to send verification calls to the 2.2 version of the verifier.
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.