Miggo Logo

CVE-2022-26477: SystemDS CPU exhaustion vulnerability

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.91108%
Published
6/28/2022
Updated
10/28/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.systemds:systemdsmaven< 2.2.22.2.2
systemdspip>= 0, < 2.2.22.2.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly identifies the readExternal method's loop termination condition as the root cause. In Java serialization, readExternal is used for custom deserialization logic. The advisory specifies that an attacker could tamper with the variable controlling the loop iteration count, which matches the pattern of CWE-400 (uncontrolled resource consumption). While the exact class/path isn't provided, the method name (readExternal) and context (serialization/deserialization in a distributed system) strongly suggest it's part of a class handling matrix/data serialization, a core component in SystemDS.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** S**urity T**m noti*** t**t t** t*rmin*tion *on*ition o* t** *or loop in t** r****xt*rn*l m*t*o* is * *ontroll**l* v*ri**l*, w*i**, i* t*mp*r** wit*, m*y l*** to *PU *x**ustion. *s * *ix, w* ***** *n upp*r *oun* *n* t*rmin*tion *on*ition in t** r*

Reasoning

T** vuln*r**ility **s*ription *xpli*itly i**nti*i*s t** r****xt*rn*l m*t*o*'s loop t*rmin*tion *on*ition *s t** root **us*. In J*v* s*ri*liz*tion, r****xt*rn*l is us** *or *ustom **s*ri*liz*tion lo*i*. T** **visory sp**i*i*s t**t *n *tt**k*r *oul* t*