CVE-2024-57652
Published: 14 January 2025
Summary
CVE-2024-57652 is a high-severity SQL Injection (CWE-89) vulnerability in Openlinksw Virtuoso. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked in the top 40.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the flaw in the numeric_to_dv component of Virtuoso v7.2.11 that allows crafted SQL statements to trigger DoS.
Protects against denial-of-service events like this remote unauthenticated DoS via crafted SQL by implementing resource limits and traffic controls.
Validates SQL statement inputs to the numeric_to_dv component, preventing exploitation through malformed or crafted queries.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated SQL injection leading to application crash and DoS directly enables T1499.004 (Application or System Exploitation).
NVD Description
An issue in the numeric_to_dv component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
Deeper analysisAI
CVE-2024-57652 affects the numeric_to_dv component in OpenLink Virtuoso Open-Source version 7.2.11. The vulnerability enables attackers to trigger a Denial of Service (DoS) condition through specially crafted SQL statements. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high severity primarily due to its impact on availability, and is classified under CWE-89.
Remote attackers require no authentication or privileges and can exploit the issue over the network with low complexity and no user interaction. Successful exploitation results in a DoS, disrupting service availability without affecting confidentiality or integrity.
Mitigation details are available in the GitHub issue at https://github.com/openlink/virtuoso-opensource/issues/1198.
Details
- CWE(s)