CWE
770
EPSS
0.045%
Advisory Published
Advisory Published
Updated

CVE-2024-31208: Synapse's V2 state resolution weakness allows DoS from remote room members

First published: Tue Apr 23 2024(Updated: )

### Impact A remote Matrix user with malicious intent, sharing a room with Synapse instances before 1.105.1, can dispatch specially crafted events to exploit a weakness in how the auth chain cover index is calculated. This can induce high CPU consumption and accumulate excessive data in the database of such instances, resulting in a denial of service. Servers in private federations, or those that do not federate, are not affected. ### Patches Server administrators should upgrade to 1.105.1 or later. ### Workarounds One can: - ban the malicious users or ACL block servers from the rooms; and/or - leave the room and purge the room using the admin API ### For more information If you have any questions or comments about this advisory, please email us at [security AT element.io](mailto:security@element.io).

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
pip/matrix-synapse<1.105.1
1.105.1
debian/matrix-synapse
1.121.0-6

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-31208?

    CVE-2024-31208 has a moderate severity as it can lead to high CPU consumption affecting system performance.

  • How do I fix CVE-2024-31208?

    To mitigate CVE-2024-31208, upgrade matrix-synapse to version 1.105.1 or later.

  • Who is affected by CVE-2024-31208?

    CVE-2024-31208 affects Synapse instances running versions prior to 1.105.1.

  • What type of vulnerability is CVE-2024-31208?

    CVE-2024-31208 is a remote code execution vulnerability that can lead to resource exhaustion.

  • Can CVE-2024-31208 be exploited remotely?

    Yes, CVE-2024-31208 can be exploited by remote Matrix users sharing a room with vulnerable Synapse instances.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203