CVE-2024-57632
Published: 14 January 2025
Summary
CVE-2024-57632 is a high-severity SQL Injection (CWE-89) vulnerability in Monetdb Monetdb. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 44.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates SQL injection in crafted statements to the is_column_unique component by validating and sanitizing database inputs.
Addresses the specific flaw in MonetDB v11.49.1 by requiring timely patching or remediation of the vulnerable is_column_unique function.
Protects the MonetDB server from remote unauthenticated DoS attacks triggered by crafted SQL statements causing crashes or unresponsiveness.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability enables remote unauthenticated exploitation of public-facing MonetDB server via malicious SQL (CWE-89) to trigger application/system crash and DoS.
NVD Description
An issue in the is_column_unique component of MonetDB Server v11.49.1 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
Deeper analysisAI
CVE-2024-57632 is a vulnerability in the is_column_unique component of MonetDB Server version 11.49.1. Published on January 14, 2025, it enables attackers to trigger a Denial of Service (DoS) condition by sending crafted SQL statements. The issue is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high severity due to its potential for significant availability impact.
Remote attackers with network access to the MonetDB server can exploit this vulnerability without authentication, privileges, or user interaction. By crafting and executing malicious SQL statements targeting the is_column_unique function, they can cause the server to crash or become unresponsive, leading to a DoS that disrupts database operations and services relying on the affected instance.
Mitigation details and further technical analysis are available in the referenced GitHub issue at https://github.com/MonetDB/MonetDB/issues/7441. Security practitioners should monitor for updates from MonetDB, as no specific patches were detailed in the initial CVE publication.
Details
- CWE(s)