CVE-2024-53458
Published: 05 March 2025
Summary
CVE-2024-53458 is a high-severity Uncontrolled Resource Consumption (CWE-400) vulnerability in Sysax Multi Server. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 36.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SC-5 directly implements denial-of-service protections to identify, prevent, and limit resource exhaustion from specially crafted SSH packets.
SI-2 requires timely flaw remediation, such as patching Sysax Multi Server to correct the uncontrolled resource consumption in SSH packet processing.
SC-7 enforces boundary protection to monitor and control SSH traffic, rate-limiting or blocking malicious packets before they reach the vulnerable server.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a DoS condition from processing crafted SSH packets due to uncontrolled resource consumption (CWE-400), directly enabling T1499.004 Application or System Exploitation to crash/deny service availability.
NVD Description
Sysax Multi Server 6.99 is vulnerable to a denial of service (DoS) condition when processing specially crafted SSH packets.
Deeper analysisAI
Sysax Multi Server version 6.99 is affected by CVE-2024-53458, a denial-of-service vulnerability that occurs when the software processes specially crafted SSH packets. This flaw, mapped to CWE-400 (Uncontrolled Resource Consumption), carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), reflecting its high impact on availability with no effects on confidentiality or integrity.
The vulnerability can be exploited by unauthenticated attackers accessible over the network, requiring low attack complexity and no user interaction. By transmitting malicious SSH packets to the server, an attacker can trigger a DoS condition, rendering the service unavailable.
Advisory information, including proof-of-concept details, is documented in references from PacketStorm Security: https://packetstormsecurity.com/files/182468/Sysax-Multi-Server-6.99-SSH-Denial-Of-Service.html and https://packetstorm.news/files/id/182468. Security practitioners should review these sources for additional technical insights and mitigation recommendations.
Details
- CWE(s)