CVE-2024-57663
Published: 14 January 2025
Summary
CVE-2024-57663 is a high-severity Allocation of Resources Without Limits or Throttling (CWE-770) vulnerability in Openlinksw Virtuoso. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SC-6 (Resource Availability).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly protects against denial-of-service attacks by limiting or blocking effects of resource exhaustion from crafted SQL statements in Virtuoso's sqlg_place_dpipes component.
Enforces resource allocation mechanisms and throttling to prevent unbounded resource consumption as described in CWE-770 for this SQL processing vulnerability.
Validates information inputs such as SQL statements to reject or mitigate crafted inputs that trigger DoS in the sqlg_place_dpipes component.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated DoS via crafted SQL on a network-exposed DB service directly enables T1190 for public app exploitation and T1499.004 for causing endpoint DoS via software vuln abuse.
NVD Description
An issue in the sqlg_place_dpipes component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
Deeper analysisAI
CVE-2024-57663 is a denial-of-service vulnerability affecting the sqlg_place_dpipes component in OpenLink Virtuoso Open-Source version 7.2.11. The issue enables attackers to disrupt service availability through specially crafted SQL statements. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is associated with CWE-770 (Allocation of Resources Without Limits or Throttling).
Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. Exploitation leads to high-impact denial of service, potentially crashing the affected Virtuoso instance and rendering it unavailable, without impacting confidentiality or integrity.
Mitigation details are available in the referenced GitHub issue at https://github.com/openlink/virtuoso-opensource/issues/1218.
Details
- CWE(s)