Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-29643

CVE-2026-29643: XiangShan RISC-V Processor DoS Vulnerability

CVE-2026-29643 is a denial of service flaw in XiangShan RISC-V processor's CSR subsystem that allows attackers to cause system hangs through improper exception handling. This article covers technical details, impact, and mitigation.

Published: April 23, 2026

CVE-2026-29643 Overview

CVE-2026-29643 is an improper exceptional-condition handling vulnerability in the XiangShan open-source high-performance RISC-V processor. The flaw exists in the Control and Status Register (CSR) subsystem, specifically within the NewCSR component. When certain sequences of CSR operations target non-existent or custom CSR addresses, the processor may trigger an illegal-instruction exception but fail to reliably transfer control to the configured trap handler (mtvec). This control-flow disruption can leave the processor core in a hung or unrecoverable state.

The vulnerability affects commit edb1dfaf7d290ae99724594507dc46c2c2125384 dated 2024-11-28 and potentially other versions. A local attacker with the ability to execute code on the processor can exploit this flaw to cause a denial of service and potentially introduce inconsistent architectural state.

Critical Impact

Local attackers can execute specific CSR instruction sequences to crash or hang the processor core, causing denial of service and potential architectural state corruption in affected XiangShan RISC-V implementations.

Affected Products

  • XiangShan RISC-V Processor commit edb1dfaf7d290ae99724594507dc46c2c2125384 (2024-11-28)
  • Potentially other XiangShan versions with the vulnerable NewCSR subsystem implementation

Discovery Timeline

  • 2026-04-20 - CVE-2026-29643 published to NVD
  • 2026-04-21 - Last updated in NVD database

Technical Details for CVE-2026-29643

Vulnerability Analysis

This vulnerability is classified under CWE-703 (Improper Check or Handling of Exceptional Conditions). The root issue lies in how the XiangShan processor's CSR subsystem handles exceptional conditions when processing CSR instructions that reference non-existent or custom register addresses.

In RISC-V architecture, CSR instructions that access invalid or unimplemented registers should generate an illegal instruction exception, with control transferring to the address specified in the mtvec (Machine Trap-Vector Base-Address) register. However, the vulnerable implementation in XiangShan's NewCSR subsystem fails to properly complete this exception handling sequence under certain conditions.

The vulnerability requires local access, meaning an attacker must be able to execute code directly on the affected processor. While this limits the attack surface, it presents serious concerns for systems where untrusted code may execute, such as multi-tenant environments or systems running potentially malicious applications.

Root Cause

The root cause is an improper exceptional-condition handling flaw in the NewCSR subsystem of the XiangShan processor. When specific sequences of CSR operations target non-existent or custom CSR addresses, the exception handling mechanism fails to reliably transfer control to the trap handler configured via mtvec. This indicates a defect in the processor's trap dispatch logic or state machine that handles illegal instruction exceptions for CSR operations.

The RISC-V specification requires that illegal CSR accesses generate synchronous exceptions with proper control transfer to the trap handler. The XiangShan implementation does not meet this requirement under certain edge-case instruction sequences, violating the expected architectural behavior defined in the RISC-V Privileged Control and Status Registers specification.

Attack Vector

The attack vector is local, requiring an attacker to execute code on the target processor. Exploitation involves crafting specific sequences of CSR instructions that target non-existent or custom CSR addresses. When executed, these instruction sequences trigger the vulnerable code path in the NewCSR subsystem, causing the processor to enter a hung or unrecoverable state.

The attack can be performed by any local user with code execution capabilities on the processor. This could include:

  • Unprivileged user-space applications on systems with direct hardware access
  • Virtual machine guests in virtualized environments
  • Embedded system firmware or applications

Technical details about the specific instruction sequences and the fix can be found in GitHub Issue #3959 and GitHub Pull Request #3966.

Detection Methods for CVE-2026-29643

Indicators of Compromise

  • Unexpected processor core hangs or freezes during normal operation
  • System watchdog timeouts indicating unresponsive cores
  • Kernel panic or crash logs referencing illegal instruction exceptions that did not properly transfer to trap handlers
  • Repeated system reboots without clear software-level cause

Detection Strategies

  • Monitor for abnormal system stability issues on XiangShan-based platforms
  • Implement hardware watchdog timers to detect and recover from processor hangs
  • Review execution logs for patterns of illegal instruction exceptions followed by system instability
  • Deploy runtime monitoring for CSR instruction patterns that target unusual or custom register addresses

Monitoring Recommendations

  • Enable hardware performance counters to track illegal instruction exception rates
  • Configure watchdog mechanisms with appropriate timeout thresholds
  • Implement system health monitoring that can detect processor core hangs
  • Log and analyze any recovery events from watchdog-triggered resets

How to Mitigate CVE-2026-29643

Immediate Actions Required

  • Update XiangShan processor implementation to a version containing the fix from Pull Request #3966
  • Review any custom CSR implementations for similar exception handling issues
  • Implement watchdog timers to detect and recover from potential processor hangs
  • Limit code execution capabilities to trusted applications where possible

Patch Information

The vulnerability has been addressed in the XiangShan project. The fix is available in GitHub Pull Request #3966. Users should update their XiangShan implementation to a commit that includes this fix. The patch corrects the exceptional-condition handling in the NewCSR subsystem to ensure proper control transfer to the trap handler when illegal CSR accesses occur.

For additional technical context, refer to the RISC-V Machine Instruction Set documentation and the RISC-V Privileged CSR specification.

Workarounds

  • Implement hardware watchdog timers to automatically reset the processor if it becomes unresponsive
  • Restrict code execution on affected systems to trusted applications only
  • Consider deploying redundant processor configurations where high availability is required
  • Monitor systems for unusual stability issues and investigate potential exploitation attempts
bash
# Example: Enable hardware watchdog on Linux systems with XiangShan processors
# This provides automatic recovery if the processor enters a hung state
# Note: Specific commands depend on system configuration

# Check if watchdog device is available
ls -la /dev/watchdog*

# Configure watchdog timeout (example for systems with watchdog support)
echo 30 > /sys/class/watchdog/watchdog0/timeout

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechXiangshan

  • SeverityHIGH

  • CVSS Score7.1

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-703
  • Technical References
  • RISC-V Machine Instruction Set

  • RISC-V Privileged Control and Status Registers

  • GitHub Issue #3959

  • GitHub Pull Request #3966
  • Related CVEs
  • CVE-2026-29644: XiangShan RISC-V Privilege Escalation Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English