CVE-2025-70957

medium

Description

A Denial of Service (DoS) vulnerability was discovered in the TON Lite Server before v2024.09. The vulnerability arises from the handling of external arguments passed to locally executed "get methods." An attacker can inject a constructed Continuation object (an internal TVM type) that is normally restricted within the VM. When the TVM executes this malicious continuation, it consumes excessive CPU resources while accruing disproportionately low virtual gas costs. This "free" computation allows an attacker to monopolize the Lite Server's processing power, significantly reducing its throughput and causing a denial of service for legitimate users acting through the gateway.

References

https://mp.weixin.qq.com/s/KT4RKNey_mjU2kBWpGTjuw

https://github.com/ton-blockchain/ton/commit/e35b34de22109596a54d1357dcce92d63002ba95

https://gist.github.com/Lucian-code233/d2589ece39914195c0e307b4dee32185

Details

Source: Mitre, NVD

Published: 2026-02-13

Updated: 2026-02-13

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Severity: Medium

CVSS v3

Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium