First published: Wed Jan 15 2025(Updated: )
In Genivia gSOAP with a specific configuration an unauthenticated remote attacker can generate a high CPU load when forcing to parse an XML having duplicate ID attributes which can lead to a DoS.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Genivia gSOAP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4227 is classified as a high severity vulnerability due to its potential to cause denial of service through excessive CPU load.
To mitigate CVE-2024-4227, you should update Genivia gSOAP to the latest version which includes patches for this issue.
Users of Genivia gSOAP configured to parse XML data with duplicate ID attributes are at risk from CVE-2024-4227.
CVE-2024-4227 is associated with denial of service attacks that exploit XML parsing vulnerabilities.
Yes, CVE-2024-4227 can be exploited by unauthenticated remote attackers.