CVE-2024-57635
Published: 14 January 2025
Summary
CVE-2024-57635 is a high-severity SQL Injection (CWE-89) vulnerability in Openlinksw Virtuoso. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 40.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the specific flaw in the chash_array component of Virtuoso v7.2.11 by applying vendor patches or updates.
Protects against resource exhaustion DoS attacks triggered by crafted SQL statements through mechanisms like rate limiting and traffic filtering.
Validates SQL statement inputs to the chash_array component, rejecting malformed or crafted inputs that lead to DoS.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated SQL injection in public-facing Virtuoso server directly enables T1190 exploitation and T1499.004 application/system exploitation for DoS via resource exhaustion.
NVD Description
An issue in the chash_array component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
Deeper analysisAI
CVE-2024-57635 is a vulnerability in the chash_array component of OpenLink Virtuoso Open-Source edition version 7.2.11. Published on 2025-01-14T01:15:12.047, it has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is classified under CWE-89. The flaw enables attackers to trigger a Denial of Service (DoS) condition through specially crafted SQL statements.
Unauthenticated attackers with network access to the vulnerable Virtuoso instance can exploit this issue. Exploitation requires low complexity and no user interaction, allowing remote parties to disrupt service availability by causing high-impact resource exhaustion, while confidentiality and integrity remain unaffected.
Mitigation details are available in the GitHub issue tracker at https://github.com/openlink/virtuoso-opensource/issues/1182.
Details
- CWE(s)