Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-47108: CWE-770: Allocation of Resources Without Limits or Throttling in open-telemetry opentelemetry-go-contrib

0
High
VulnerabilityCVE-2023-47108cvecve-2023-47108cwe-770
Published: Fri Nov 10 2023 (11/10/2023, 18:31:33 UTC)
Source: CVE Database V5
Vendor/Project: open-telemetry
Product: opentelemetry-go-contrib

Description

OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. Starting in version 0.37.0 and prior to version 0.46.0, the grpc Unary Server Interceptor out of the box adds labels `net.peer.sock.addr` and `net.peer.sock.port` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. An attacker can easily flood the peer address and port for requests. Version 0.46.0 contains a fix for this issue. As a workaround to stop being affected, a view removing the attributes can be used. The other possibility is to disable grpc metrics instrumentation by passing `otelgrpc.WithMeterProvider` option with `noop.NewMeterProvider`.

AI-Powered Analysis

AILast updated: 10/28/2025, 19:18:43 UTC

Technical Analysis

CVE-2023-47108 is a resource exhaustion vulnerability classified under CWE-770, affecting the OpenTelemetry-Go Contrib library specifically between versions 0.37.0 and 0.46.0. The grpc Unary Server Interceptor component automatically attaches two labels, `net.peer.sock.addr` and `net.peer.sock.port`, to telemetry data. These labels have unbounded cardinality because they directly reflect the peer socket address and port of incoming requests. An attacker can exploit this by sending a large volume of requests with varying source addresses and ports, causing the server to allocate memory for an ever-growing set of unique label values. This unthrottled resource allocation can lead to memory exhaustion and potentially crash or degrade the performance of the telemetry server, resulting in denial of service. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The issue was resolved in version 0.46.0 by limiting or removing these unbounded labels. Workarounds include configuring a view to remove these attributes or disabling grpc metrics instrumentation by using the `otelgrpc.WithMeterProvider` option with a no-op meter provider, which prevents the collection of these problematic metrics.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of telemetry infrastructure that relies on the affected OpenTelemetry-Go Contrib versions. Telemetry data is critical for monitoring, observability, and incident response; disruption can impair the ability to detect and respond to other security incidents or operational issues. Organizations with high-volume grpc services or those exposed to untrusted networks are particularly vulnerable to denial of service attacks exploiting this flaw. The memory exhaustion can lead to service crashes or degraded performance, impacting business continuity and potentially causing cascading failures in dependent systems. Given the widespread adoption of OpenTelemetry in cloud-native and microservices environments, the impact could be broad, affecting sectors such as finance, healthcare, telecommunications, and public services across Europe. The lack of known exploits in the wild suggests limited active exploitation currently, but the ease of exploitation and high severity score warrant proactive mitigation.

Mitigation Recommendations

European organizations should immediately upgrade OpenTelemetry-Go Contrib to version 0.46.0 or later to fully remediate the vulnerability. If upgrading is not immediately feasible, implement one of the following mitigations: configure a telemetry view to remove the `net.peer.sock.addr` and `net.peer.sock.port` attributes from grpc metrics to prevent unbounded label cardinality; or disable grpc metrics instrumentation by passing the `otelgrpc.WithMeterProvider` option with a no-op meter provider to stop collection of these metrics entirely. Additionally, organizations should monitor grpc service logs and telemetry for unusual spikes in unique peer addresses or ports, which could indicate exploitation attempts. Network-level rate limiting or filtering of suspicious traffic sources can also reduce attack surface. Finally, incorporate this vulnerability into incident response and patch management workflows to ensure timely remediation and awareness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2023-10-30T19:57:51.673Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690116f28f31b6f061e5f1fc

Added to database: 10/28/2025, 7:18:10 PM

Last enriched: 10/28/2025, 7:18:43 PM

Last updated: 11/6/2025, 8:26:29 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats