Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 22 Apr 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Privilege Escalation via Status Register Tampering on XiangShan RISC‑V Processors |
Wed, 22 Apr 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Privileged CSR Access Enables Corruption of Reserved Bits in XiangShan Status Register | |
| Weaknesses | CWE-682 |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1244 | |
| Metrics |
cvssV3_1
|
Tue, 21 Apr 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openxiangshan
Openxiangshan xiangshan |
|
| Vendors & Products |
Openxiangshan
Openxiangshan xiangshan |
Tue, 21 Apr 2026 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Privileged CSR Access Enables Corruption of Reserved Bits in XiangShan Status Register | |
| Weaknesses | CWE-682 |
Mon, 20 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A local attacker who can execute privileged CSR operations (or can induce firmware to do so) performs carefully crafted reads/writes to menvcfg (e.g., csrrs in M-mode). On affected XiangShan versions (commit aecf601e803bfd2371667a3fb60bfcd83c333027, 2024-11-19), these menvcfg accesses can unexpectedly set WPRI (reserved) bits in the status view (xstatus) to 1. RISC-V defines WPRI fields as "writes preserve values, reads ignore values," i.e., they must not be modified by software manipulating other fields, and menvcfg itself contains multiple WPRI fields. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-21T19:50:54.758Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-29642
Updated: 2026-04-21T13:52:14.379Z
Status : Awaiting Analysis
Published: 2026-04-20T21:16:19.393
Modified: 2026-04-21T20:16:40.063
Link: CVE-2026-29642
No data.
OpenCVE Enrichment
Updated: 2026-04-22T07:45:11Z