NEMU contains an implementation flaw in its RISC-V Hypervisor CSR handling where henvcfg[7:4] (CBIE/CBCFE/CBZE-related fields) is incorrectly masked/updated based on menvcfg[7:4], so a machine-mode write to menvcfg can implicitly modify the hypervisor's environment configuration. This can lead to incorrect enforcement of virtualization configuration and may cause unexpected traps or denial of service when executing cache-block management instructions in virtualized contexts (V=1).
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Title RISC‑V Hypervisor Unauthorized Configuration Modification Causing Denial of Service

Wed, 22 Apr 2026 07:45:00 +0000

Type Values Removed Values Added
Title RISC‑V Hypervisor Unauthorized Configuration Modification Causing Denial of Service
Weaknesses CWE-269
CWE-284

Wed, 22 Apr 2026 04:00:00 +0000

Type Values Removed Values Added
Title Vulnerability in NEMU RISC‑V Hypervisor CSR Handling Allows Implicit Modification of Hypervisor Configuration Leading to Denial of Service

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-693
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 21 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Title Vulnerability in NEMU RISC‑V Hypervisor CSR Handling Allows Implicit Modification of Hypervisor Configuration Leading to Denial of Service
Weaknesses CWE-269
CWE-284

Mon, 20 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description NEMU contains an implementation flaw in its RISC-V Hypervisor CSR handling where henvcfg[7:4] (CBIE/CBCFE/CBZE-related fields) is incorrectly masked/updated based on menvcfg[7:4], so a machine-mode write to menvcfg can implicitly modify the hypervisor's environment configuration. This can lead to incorrect enforcement of virtualization configuration and may cause unexpected traps or denial of service when executing cache-block management instructions in virtualized contexts (V=1).
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-21T19:51:00.279Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-29649

cve-icon Vulnrichment

Updated: 2026-04-21T13:49:49.167Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-20T20:16:48.410

Modified: 2026-04-21T20:16:41.027

Link: CVE-2026-29649

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T09:00:09Z

Weaknesses