Cyber Posture

CVE-2024-53379

High

Published: 23 January 2025

Published
23 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0058 69.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Heap buffer overflow in the server site handshake implementation in Real Time Logic LLC's SharkSSL version (from 05/05/24) commit 64808a5e12c83b38f85c943dee0112e428dc2a43 allows a remote attacker to trigger a Denial-of-Service via a malformed Client-Hello message.

Security Summary

CVE-2024-53379 is a heap buffer overflow vulnerability (CWE-120) in the server-side handshake implementation of Real Time Logic LLC's SharkSSL library, affecting versions starting from the commit 64808a5e12c83b38f85c943dee0112e428dc2a43 dated 05/05/24. The issue arises during processing of SSL/TLS handshakes and has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high severity primarily due to its potential for availability disruption.

A remote attacker can exploit this vulnerability by sending a malformed Client-Hello message to a vulnerable SharkSSL server, triggering the heap buffer overflow and causing a denial-of-service condition, such as application crash or service unavailability. Exploitation requires no authentication or user interaction, only network access to the affected service, making it accessible to unauthenticated attackers over the internet.

Mitigation details and additional analysis are available in the advisory published by Telekom at https://www.telekom.com/resource/blob/1086326/e6e800ec1e4e675ca0d8fdafab86ea8c/dl-250122-cve-2024-53379-data.pdf. The vulnerability was publicly disclosed on 2025-01-23.

Details

CWE(s)
CWE-120

References