CVE-2024-57616
Published: 14 January 2025
Summary
CVE-2024-57616 is a high-severity SQL Injection (CWE-89) vulnerability in Monetdb Monetdb. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 30.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely remediation of the specific flaw in the MonetDB vscanf component, directly eliminating the DoS vulnerability exploitable via crafted SQL statements.
SC-5 implements denial-of-service protections that limit the impact of resource exhaustion attacks triggered by crafted SQL inputs to the vscanf component.
SI-10 enforces validation of SQL statement inputs, preventing malformed crafted statements from exploiting the vscanf component to cause DoS.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated exploitation of public-facing MonetDB via crafted SQL input directly enables application-layer DoS through vulnerability abuse.
NVD Description
An issue in the vscanf component of MonetDB Server v11.47.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
Deeper analysisAI
CVE-2024-57616 is a vulnerability in the vscanf component of MonetDB Server version 11.47.11. The issue enables attackers to trigger a Denial of Service (DoS) condition by sending crafted SQL statements. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high severity primarily due to its impact on availability, and is linked to CWE-89.
Remote attackers can exploit this vulnerability without authentication, privileges, or user interaction, as it is accessible over the network with low complexity. Successful exploitation results in a DoS, disrupting service availability on affected MonetDB Server instances while causing no impact to confidentiality or integrity.
Mitigation details are available in the referenced GitHub issue at https://github.com/MonetDB/MonetDB/issues/7412.
Details
- CWE(s)