// For flags

CVE-2024-37309

Client initialized Session-Renegotiation DoS

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

CrateDB is a distributed SQL database. A high-risk vulnerability has been identified in versions prior to 5.7.2 where the TLS endpoint (port 4200) permits client-initiated renegotiation. In this scenario, an attacker can exploit this feature to repeatedly request renegotiation of security parameters during an ongoing TLS session. This flaw could lead to excessive consumption of CPU resources, resulting in potential server overload and service disruption. The vulnerability was confirmed using an openssl client where the command `R` initiates renegotiation, followed by the server confirming with `RENEGOTIATING`. This vulnerability allows an attacker to perform a denial of service attack by exhausting server CPU resources through repeated TLS renegotiations. This impacts the availability of services running on the affected server, posing a significant risk to operational stability and security. TLS 1.3 explicitly forbids renegotiation, since it closes a window of opportunity for an attack. Version 5.7.2 of CrateDB contains the fix for the issue.

CrateDB es una base de datos SQL distribuida. Se identificó una vulnerabilidad de alto riesgo en versiones anteriores a la 5.7.2 donde el endpoint TLS (puerto 4200) permite la renegociación iniciada por el cliente. En este escenario, un atacante puede aprovechar esta característica para solicitar repetidamente la renegociación de los parámetros de seguridad durante una sesión TLS en curso. Esta falla podría provocar un consumo excesivo de recursos de la CPU, lo que provocaría una posible sobrecarga del servidor e interrupción del servicio. La vulnerabilidad se confirmó utilizando un cliente openssl donde el comando "R" inicia la renegociación, seguido por el servidor que confirma con "RENEGOTIATING". Esta vulnerabilidad permite a un atacante realizar un ataque de denegación de servicio agotando los recursos de la CPU del servidor mediante repetidas renegociaciones de TLS. Esto afecta la disponibilidad de los servicios que se ejecutan en el servidor afectado, lo que representa un riesgo significativo para la estabilidad operativa y la seguridad. TLS 1.3 prohíbe explícitamente la renegociación, ya que cierra una ventana de oportunidad para un ataque. La versión 5.7.2 de CrateDB contiene la solución al problema.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-06-05 CVE Reserved
  • 2024-06-13 CVE Published
  • 2024-06-14 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Crate
Search vendor "Crate"
Crate
Search vendor "Crate" for product "Crate"
< 5.7.2
Search vendor "Crate" for product "Crate" and version " < 5.7.2"
en
Affected