CVE-2022-31028: CWE-400: Uncontrolled Resource Consumption in minio minio
MinIO is a multi-cloud object storage solution. Starting with version RELEASE.2019-09-25T18-25-51Z and ending with version RELEASE.2022-06-02T02-11-04Z, MinIO is vulnerable to an unending go-routine buildup while keeping connections established due to HTTP clients not closing the connections. Public-facing MinIO deployments are most affected. Users should upgrade to RELEASE.2022-06-02T02-11-04Z to receive a patch. One possible workaround is to use a reverse proxy to limit the number of connections being attempted in front of MinIO, and actively rejecting connections from such malicious clients.
AI Analysis
Technical Summary
CVE-2022-31028 is a vulnerability identified in MinIO, a widely used multi-cloud object storage solution. The issue affects MinIO versions starting from RELEASE.2019-09-25T18-25-51Z up to but not including RELEASE.2022-06-02T02-11-04Z. The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption. Specifically, the flaw allows an attacker to cause an unending buildup of Go routines (lightweight threads in Go programming language) by maintaining open HTTP connections that the server does not properly close. This results in resource exhaustion on the server, potentially leading to denial of service (DoS) conditions. The vulnerability primarily impacts public-facing MinIO deployments where external clients can establish connections. The root cause is the failure of the server to close connections when HTTP clients do not close them, causing the server to keep spawning Go routines indefinitely. Although no known exploits are currently reported in the wild, the vulnerability poses a risk of service disruption. The vendor has addressed this issue in RELEASE.2022-06-02T02-11-04Z, and users are strongly advised to upgrade to this or later versions. As a mitigation, deploying a reverse proxy in front of MinIO to limit and control the number of incoming connections can help reduce the risk by rejecting malicious clients attempting to exhaust resources. This vulnerability does not require authentication or user interaction to be exploited, making it accessible to unauthenticated attackers who can reach the MinIO service endpoint.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on MinIO for critical object storage services in public or hybrid cloud environments. Resource exhaustion caused by unbounded Go routine buildup can lead to degraded performance or complete denial of service, disrupting business operations, data availability, and potentially affecting dependent applications and services. This can impact sectors such as finance, healthcare, government, and cloud service providers that use MinIO for scalable storage solutions. The disruption may also lead to indirect effects such as loss of customer trust, regulatory compliance issues (especially under GDPR if data availability is compromised), and financial losses due to downtime. Since the vulnerability can be exploited remotely without authentication, the attack surface is broad, particularly for internet-facing MinIO instances. Organizations with public-facing storage endpoints are at higher risk, whereas internal deployments behind strict network controls may be less exposed.
Mitigation Recommendations
1. Immediate upgrade to MinIO RELEASE.2022-06-02T02-11-04Z or later to apply the official patch addressing the uncontrolled resource consumption issue. 2. Deploy a reverse proxy or load balancer (e.g., NGINX, HAProxy) in front of MinIO to limit the number of simultaneous connections per client IP and implement connection timeouts to prevent resource exhaustion from slow or malicious clients. 3. Implement network-level access controls such as firewall rules or VPNs to restrict access to MinIO endpoints only to trusted clients and internal networks where possible. 4. Monitor MinIO server metrics and logs for unusual spikes in Go routine counts, connection attempts, or resource usage to detect potential exploitation attempts early. 5. Conduct regular security assessments and penetration testing focused on resource exhaustion and DoS vectors in the storage infrastructure. 6. Consider rate limiting and anomaly detection mechanisms at the application or network layer to identify and block abusive traffic patterns targeting MinIO services.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland, Belgium, Italy
CVE-2022-31028: CWE-400: Uncontrolled Resource Consumption in minio minio
Description
MinIO is a multi-cloud object storage solution. Starting with version RELEASE.2019-09-25T18-25-51Z and ending with version RELEASE.2022-06-02T02-11-04Z, MinIO is vulnerable to an unending go-routine buildup while keeping connections established due to HTTP clients not closing the connections. Public-facing MinIO deployments are most affected. Users should upgrade to RELEASE.2022-06-02T02-11-04Z to receive a patch. One possible workaround is to use a reverse proxy to limit the number of connections being attempted in front of MinIO, and actively rejecting connections from such malicious clients.
AI-Powered Analysis
Technical Analysis
CVE-2022-31028 is a vulnerability identified in MinIO, a widely used multi-cloud object storage solution. The issue affects MinIO versions starting from RELEASE.2019-09-25T18-25-51Z up to but not including RELEASE.2022-06-02T02-11-04Z. The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption. Specifically, the flaw allows an attacker to cause an unending buildup of Go routines (lightweight threads in Go programming language) by maintaining open HTTP connections that the server does not properly close. This results in resource exhaustion on the server, potentially leading to denial of service (DoS) conditions. The vulnerability primarily impacts public-facing MinIO deployments where external clients can establish connections. The root cause is the failure of the server to close connections when HTTP clients do not close them, causing the server to keep spawning Go routines indefinitely. Although no known exploits are currently reported in the wild, the vulnerability poses a risk of service disruption. The vendor has addressed this issue in RELEASE.2022-06-02T02-11-04Z, and users are strongly advised to upgrade to this or later versions. As a mitigation, deploying a reverse proxy in front of MinIO to limit and control the number of incoming connections can help reduce the risk by rejecting malicious clients attempting to exhaust resources. This vulnerability does not require authentication or user interaction to be exploited, making it accessible to unauthenticated attackers who can reach the MinIO service endpoint.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on MinIO for critical object storage services in public or hybrid cloud environments. Resource exhaustion caused by unbounded Go routine buildup can lead to degraded performance or complete denial of service, disrupting business operations, data availability, and potentially affecting dependent applications and services. This can impact sectors such as finance, healthcare, government, and cloud service providers that use MinIO for scalable storage solutions. The disruption may also lead to indirect effects such as loss of customer trust, regulatory compliance issues (especially under GDPR if data availability is compromised), and financial losses due to downtime. Since the vulnerability can be exploited remotely without authentication, the attack surface is broad, particularly for internet-facing MinIO instances. Organizations with public-facing storage endpoints are at higher risk, whereas internal deployments behind strict network controls may be less exposed.
Mitigation Recommendations
1. Immediate upgrade to MinIO RELEASE.2022-06-02T02-11-04Z or later to apply the official patch addressing the uncontrolled resource consumption issue. 2. Deploy a reverse proxy or load balancer (e.g., NGINX, HAProxy) in front of MinIO to limit the number of simultaneous connections per client IP and implement connection timeouts to prevent resource exhaustion from slow or malicious clients. 3. Implement network-level access controls such as firewall rules or VPNs to restrict access to MinIO endpoints only to trusted clients and internal networks where possible. 4. Monitor MinIO server metrics and logs for unusual spikes in Go routine counts, connection attempts, or resource usage to detect potential exploitation attempts early. 5. Conduct regular security assessments and penetration testing focused on resource exhaustion and DoS vectors in the storage infrastructure. 6. Consider rate limiting and anomaly detection mechanisms at the application or network layer to identify and block abusive traffic patterns targeting MinIO services.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9848c4522896dcbf660e
Added to database: 5/21/2025, 9:09:28 AM
Last enriched: 6/22/2025, 12:37:20 AM
Last updated: 2/7/2026, 11:24:15 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.