Cyber Posture

CVE-2024-53319

High

Published: 31 January 2025

Published
31 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0048 65.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

A heap buffer overflow in the XML Text Escaping component of Qualisys C++ SDK commit a32a21a allows attackers to cause Denial of Service (DoS) via escaping special XML characters.

Security Summary

CVE-2024-53319 is a heap buffer overflow vulnerability in the XML Text Escaping component of the Qualisys C++ SDK at commit a32a21a. This flaw, classified under CWE-120 (Buffer Copy without Checking Size of Input), enables attackers to trigger a denial of service (DoS) condition by providing input containing special XML characters that exceed buffer boundaries during the escaping process. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high severity due to its potential for remote disruption without requiring authentication or user interaction.

Attackers can exploit this vulnerability remotely over the network with low complexity and no privileges. By supplying malformed input with special XML characters to any application or service using the affected Qualisys C++ SDK commit, an unauthenticated adversary can cause a heap buffer overflow, leading to application crashes or resource exhaustion that results in DoS. There is no impact on confidentiality or integrity, but the availability disruption can affect dependent systems processing XML data.

Further details on the vulnerability, including potential patches or workarounds, are documented in the GitHub issue at https://github.com/qualisys/qualisys_cpp_sdk/issues/49. Security practitioners using the Qualisys C++ SDK should review this advisory and update to a fixed commit if available to mitigate the risk.

Details

CWE(s)
CWE-120

References