CVE-2023-47108: CWE-770: Allocation of Resources Without Limits or Throttling in open-telemetry opentelemetry-go-contrib
OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. Starting in version 0.37.0 and prior to version 0.46.0, the grpc Unary Server Interceptor out of the box adds labels `net.peer.sock.addr` and `net.peer.sock.port` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. An attacker can easily flood the peer address and port for requests. Version 0.46.0 contains a fix for this issue. As a workaround to stop being affected, a view removing the attributes can be used. The other possibility is to disable grpc metrics instrumentation by passing `otelgrpc.WithMeterProvider` option with `noop.NewMeterProvider`.
AI Analysis
Technical Summary
CVE-2023-47108 is a resource exhaustion vulnerability classified under CWE-770, affecting the OpenTelemetry-Go Contrib library specifically between versions 0.37.0 and 0.46.0. The grpc Unary Server Interceptor component automatically attaches two labels, `net.peer.sock.addr` and `net.peer.sock.port`, to telemetry data. These labels have unbounded cardinality because they directly reflect the peer socket address and port of incoming requests. An attacker can exploit this by sending a large volume of requests with varying source addresses and ports, causing the server to allocate memory for an ever-growing set of unique label values. This unthrottled resource allocation can lead to memory exhaustion and potentially crash or degrade the performance of the telemetry server, resulting in denial of service. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The issue was resolved in version 0.46.0 by limiting or removing these unbounded labels. Workarounds include configuring a view to remove these attributes or disabling grpc metrics instrumentation by using the `otelgrpc.WithMeterProvider` option with a no-op meter provider, which prevents the collection of these problematic metrics.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of telemetry infrastructure that relies on the affected OpenTelemetry-Go Contrib versions. Telemetry data is critical for monitoring, observability, and incident response; disruption can impair the ability to detect and respond to other security incidents or operational issues. Organizations with high-volume grpc services or those exposed to untrusted networks are particularly vulnerable to denial of service attacks exploiting this flaw. The memory exhaustion can lead to service crashes or degraded performance, impacting business continuity and potentially causing cascading failures in dependent systems. Given the widespread adoption of OpenTelemetry in cloud-native and microservices environments, the impact could be broad, affecting sectors such as finance, healthcare, telecommunications, and public services across Europe. The lack of known exploits in the wild suggests limited active exploitation currently, but the ease of exploitation and high severity score warrant proactive mitigation.
Mitigation Recommendations
European organizations should immediately upgrade OpenTelemetry-Go Contrib to version 0.46.0 or later to fully remediate the vulnerability. If upgrading is not immediately feasible, implement one of the following mitigations: configure a telemetry view to remove the `net.peer.sock.addr` and `net.peer.sock.port` attributes from grpc metrics to prevent unbounded label cardinality; or disable grpc metrics instrumentation by passing the `otelgrpc.WithMeterProvider` option with a no-op meter provider to stop collection of these metrics entirely. Additionally, organizations should monitor grpc service logs and telemetry for unusual spikes in unique peer addresses or ports, which could indicate exploitation attempts. Network-level rate limiting or filtering of suspicious traffic sources can also reduce attack surface. Finally, incorporate this vulnerability into incident response and patch management workflows to ensure timely remediation and awareness.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland, Belgium, Italy
CVE-2023-47108: CWE-770: Allocation of Resources Without Limits or Throttling in open-telemetry opentelemetry-go-contrib
Description
OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. Starting in version 0.37.0 and prior to version 0.46.0, the grpc Unary Server Interceptor out of the box adds labels `net.peer.sock.addr` and `net.peer.sock.port` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. An attacker can easily flood the peer address and port for requests. Version 0.46.0 contains a fix for this issue. As a workaround to stop being affected, a view removing the attributes can be used. The other possibility is to disable grpc metrics instrumentation by passing `otelgrpc.WithMeterProvider` option with `noop.NewMeterProvider`.
AI-Powered Analysis
Technical Analysis
CVE-2023-47108 is a resource exhaustion vulnerability classified under CWE-770, affecting the OpenTelemetry-Go Contrib library specifically between versions 0.37.0 and 0.46.0. The grpc Unary Server Interceptor component automatically attaches two labels, `net.peer.sock.addr` and `net.peer.sock.port`, to telemetry data. These labels have unbounded cardinality because they directly reflect the peer socket address and port of incoming requests. An attacker can exploit this by sending a large volume of requests with varying source addresses and ports, causing the server to allocate memory for an ever-growing set of unique label values. This unthrottled resource allocation can lead to memory exhaustion and potentially crash or degrade the performance of the telemetry server, resulting in denial of service. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The issue was resolved in version 0.46.0 by limiting or removing these unbounded labels. Workarounds include configuring a view to remove these attributes or disabling grpc metrics instrumentation by using the `otelgrpc.WithMeterProvider` option with a no-op meter provider, which prevents the collection of these problematic metrics.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of telemetry infrastructure that relies on the affected OpenTelemetry-Go Contrib versions. Telemetry data is critical for monitoring, observability, and incident response; disruption can impair the ability to detect and respond to other security incidents or operational issues. Organizations with high-volume grpc services or those exposed to untrusted networks are particularly vulnerable to denial of service attacks exploiting this flaw. The memory exhaustion can lead to service crashes or degraded performance, impacting business continuity and potentially causing cascading failures in dependent systems. Given the widespread adoption of OpenTelemetry in cloud-native and microservices environments, the impact could be broad, affecting sectors such as finance, healthcare, telecommunications, and public services across Europe. The lack of known exploits in the wild suggests limited active exploitation currently, but the ease of exploitation and high severity score warrant proactive mitigation.
Mitigation Recommendations
European organizations should immediately upgrade OpenTelemetry-Go Contrib to version 0.46.0 or later to fully remediate the vulnerability. If upgrading is not immediately feasible, implement one of the following mitigations: configure a telemetry view to remove the `net.peer.sock.addr` and `net.peer.sock.port` attributes from grpc metrics to prevent unbounded label cardinality; or disable grpc metrics instrumentation by passing the `otelgrpc.WithMeterProvider` option with a no-op meter provider to stop collection of these metrics entirely. Additionally, organizations should monitor grpc service logs and telemetry for unusual spikes in unique peer addresses or ports, which could indicate exploitation attempts. Network-level rate limiting or filtering of suspicious traffic sources can also reduce attack surface. Finally, incorporate this vulnerability into incident response and patch management workflows to ensure timely remediation and awareness.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2023-10-30T19:57:51.673Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690116f28f31b6f061e5f1fc
Added to database: 10/28/2025, 7:18:10 PM
Last enriched: 10/28/2025, 7:18:43 PM
Last updated: 11/6/2025, 8:26:29 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumCVE-2025-12471: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nerdpressteam Hubbub Lite – Fast, free social sharing and follow buttons
MediumCVE-2025-9338: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in ASUS Armoury Crate
HighCVE-2025-12560: CWE-918 Server-Side Request Forgery (SSRF) in pr-gateway Blog2Social: Social Media Auto Post & Scheduler
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.