Cyber Posture

CVE-2026-29642

High

Published: 20 April 2026

Published
20 April 2026
Modified
21 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 1.9th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-29642 is a high-severity Internal Asset Exposed to Unsafe Debug Access Level or State (CWE-1244) vulnerability. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 1.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-7 (Software, Firmware, and Information Integrity).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the improper menvcfg CSR handling vulnerability by applying the XiangShan patch from commit 5e3dd63.

preventdetect

Verifies and monitors the integrity of processor firmware to ensure only the patched XiangShan version is deployed and unaltered.

detect

Vulnerability scanning identifies systems using affected XiangShan versions up to commit aecf601e803bfd2371667a3fb60bfcd83c333027 vulnerable to CVE-2026-29642.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local M-mode CSR manipulation in RISC-V core allows unauthorized modification of reserved status bits, directly enabling privilege escalation or high-impact C/I/A effects on the host system.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

A local attacker who can execute privileged CSR operations (or can induce firmware to do so) performs carefully crafted reads/writes to menvcfg (e.g., csrrs in M-mode). On affected XiangShan versions (commit aecf601e803bfd2371667a3fb60bfcd83c333027, 2024-11-19), these menvcfg accesses can unexpectedly set WPRI…

more

(reserved) bits in the status view (xstatus) to 1. RISC-V defines WPRI fields as "writes preserve values, reads ignore values," i.e., they must not be modified by software manipulating other fields, and menvcfg itself contains multiple WPRI fields.

Deeper analysisAI

CVE-2026-29642 is a vulnerability in the XiangShan open-source RISC-V processor implementation, affecting versions up to commit aecf601e803bfd2371667a3fb60bfcd83c333027 (dated 2024-11-19). It stems from improper handling of reads and writes to the menvcfg control and status register (CSR) in Machine mode (M-mode), such as via csrrs instructions. These operations can unexpectedly set reserved WPRI bits in the xstatus status view to 1, violating RISC-V specifications that define WPRI fields as "writes preserve values, reads ignore values." Such fields must remain unmodified by software manipulating other CSRs, and menvcfg itself contains multiple WPRI bits. The issue is tracked under CWE-1244 with a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-04-20.

A local attacker capable of executing privileged CSR operations—or inducing firmware to do so—can exploit this flaw with low complexity. Exploitation involves performing crafted menvcfg accesses in M-mode, leading to high-impact confidentiality, integrity, and availability effects through unauthorized modification of reserved processor state bits.

Mitigation is available via XiangShan commit 5e3dd63 on GitHub, which addresses the issue post-affected version. Additional details are in GitHub issue #3934. RISC-V privileged ISA documentation at the referenced URLs outlines machine-mode CSRs and WPRI field behaviors.

Details

CWE(s)

Affected Products

XiangShan
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2024-0114Shared CWE-1244
CVE-2025-42878Shared CWE-1244

References