Cyber Posture

CVE-2024-53458

HighPublic PoC

Published: 05 March 2025

Published
05 March 2025
Modified
23 September 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0016 36.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-53458 is a high-severity Uncontrolled Resource Consumption (CWE-400) vulnerability in Sysax Multi Server. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 36.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

preventdetect

SC-5 directly implements denial-of-service protections to identify, prevent, and limit resource exhaustion from specially crafted SSH packets.

prevent

SI-2 requires timely flaw remediation, such as patching Sysax Multi Server to correct the uncontrolled resource consumption in SSH packet processing.

preventdetect

SC-7 enforces boundary protection to monitor and control SSH traffic, rate-limiting or blocking malicious packets before they reach the vulnerable server.

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

The CVE describes a DoS condition from processing crafted SSH packets due to uncontrolled resource consumption (CWE-400), directly enabling T1499.004 Application or System Exploitation to crash/deny service availability.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Sysax Multi Server 6.99 is vulnerable to a denial of service (DoS) condition when processing specially crafted SSH packets.

Deeper analysisAI

Sysax Multi Server version 6.99 is affected by CVE-2024-53458, a denial-of-service vulnerability that occurs when the software processes specially crafted SSH packets. This flaw, mapped to CWE-400 (Uncontrolled Resource Consumption), carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), reflecting its high impact on availability with no effects on confidentiality or integrity.

The vulnerability can be exploited by unauthenticated attackers accessible over the network, requiring low attack complexity and no user interaction. By transmitting malicious SSH packets to the server, an attacker can trigger a DoS condition, rendering the service unavailable.

Advisory information, including proof-of-concept details, is documented in references from PacketStorm Security: https://packetstormsecurity.com/files/182468/Sysax-Multi-Server-6.99-SSH-Denial-Of-Service.html and https://packetstorm.news/files/id/182468. Security practitioners should review these sources for additional technical insights and mitigation recommendations.

Details

CWE(s)

Affected Products

sysax
multi server
6.99

CVEs Like This One

CVE-2023-54337Same product: Sysax Multi Server
CVE-2012-10060Same product: Sysax Multi Server
CVE-2025-9464Shared CWE-400
CVE-2024-57085Shared CWE-400
CVE-2024-56921Shared CWE-400
CVE-2026-33538Shared CWE-400
CVE-2025-9280Shared CWE-400
CVE-2026-28412Shared CWE-400
CVE-2026-33750Shared CWE-400
CVE-2026-34290Shared CWE-400

References