Cyber Posture

CVE-2024-4227

High

Published: 15 January 2025

Published
15 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0019 40.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

In Genivia gSOAP with a specific configuration an unauthenticated remote attacker can generate a high CPU load when forcing to parse an XML having duplicate ID attributes which can lead to a DoS.

Security Summary

CVE-2024-4227 is a denial-of-service vulnerability in Genivia gSOAP under a specific configuration. An unauthenticated remote attacker can force the software to parse an XML document containing duplicate ID attributes, resulting in high CPU load that leads to a DoS condition. The vulnerability is rated 7.5 on the CVSS v3.1 scale (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is associated with CWE-834.

The attack requires no privileges or user interaction and can be carried out over the network with low complexity. An unauthenticated remote attacker simply needs to send a malicious XML payload with duplicate ID attributes to a vulnerable gSOAP instance, causing excessive resource consumption and potential service disruption due to elevated CPU usage.

Advisories from Genivia reference an upgrade recommendation specifically when the -c++11 option is used to generate C++11 source code, with further details available in the gSOAP changelog on SourceForge.

Details

CWE(s)
CWE-834

References