CVE-2023-50967: n/a
latchset jose through version 11 allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.
AI Analysis
Technical Summary
CVE-2023-50967 identifies a denial of service (DoS) vulnerability in the latchset jose cryptographic library, affecting versions through 11. The vulnerability stems from the handling of the PBES2 Count (p2c) parameter, which is part of the password-based encryption scheme 2 (PBES2) used in JSON Object Signing and Encryption (JOSE) standards. Specifically, an attacker can supply an excessively large p2c value, which controls the iteration count for key derivation functions. This large value causes the library to perform an excessive number of CPU-intensive operations, leading to resource exhaustion and denial of service. The CVSS v3.1 score is 7.5 (high), reflecting that the attack can be launched remotely (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts availability (A:H) without affecting confidentiality or integrity. The vulnerability is categorized under CWE-400 (Uncontrolled Resource Consumption). No patches or exploits are currently publicly available, but the risk remains significant due to the potential for service disruption in applications relying on this library for cryptographic functions.
Potential Impact
For European organizations, the primary impact is on availability, as successful exploitation can cause denial of service through CPU exhaustion. This can disrupt critical services that depend on latchset jose for encryption or signing operations, potentially affecting secure communications, authentication mechanisms, or data protection workflows. Industries such as finance, healthcare, and government, which rely heavily on cryptographic libraries for secure data handling, may experience service outages or degraded performance. The lack of impact on confidentiality and integrity limits the risk of data breaches, but operational disruptions could lead to financial losses, reputational damage, and regulatory scrutiny under frameworks like GDPR if service availability is compromised. Organizations with high transaction volumes or real-time processing requirements are particularly vulnerable to performance degradation caused by this vulnerability.
Mitigation Recommendations
Immediate mitigation involves implementing input validation to restrict the maximum allowable p2c value to a safe threshold, preventing excessive CPU consumption. Organizations should monitor usage patterns for unusually high iteration counts in PBES2 operations and apply rate limiting or anomaly detection to mitigate potential abuse. Since no official patch is currently available, consider isolating or sandboxing components using latchset jose to limit the impact of potential DoS attacks. Engage with the library maintainers to track patch releases and plan timely updates once available. Additionally, review cryptographic usage policies to ensure that password-based encryption parameters are configured securely and do not allow untrusted input to control iteration counts. Incorporating these measures into secure development and deployment practices will reduce exposure until a formal fix is released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2023-50967: n/a
Description
latchset jose through version 11 allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.
AI-Powered Analysis
Technical Analysis
CVE-2023-50967 identifies a denial of service (DoS) vulnerability in the latchset jose cryptographic library, affecting versions through 11. The vulnerability stems from the handling of the PBES2 Count (p2c) parameter, which is part of the password-based encryption scheme 2 (PBES2) used in JSON Object Signing and Encryption (JOSE) standards. Specifically, an attacker can supply an excessively large p2c value, which controls the iteration count for key derivation functions. This large value causes the library to perform an excessive number of CPU-intensive operations, leading to resource exhaustion and denial of service. The CVSS v3.1 score is 7.5 (high), reflecting that the attack can be launched remotely (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts availability (A:H) without affecting confidentiality or integrity. The vulnerability is categorized under CWE-400 (Uncontrolled Resource Consumption). No patches or exploits are currently publicly available, but the risk remains significant due to the potential for service disruption in applications relying on this library for cryptographic functions.
Potential Impact
For European organizations, the primary impact is on availability, as successful exploitation can cause denial of service through CPU exhaustion. This can disrupt critical services that depend on latchset jose for encryption or signing operations, potentially affecting secure communications, authentication mechanisms, or data protection workflows. Industries such as finance, healthcare, and government, which rely heavily on cryptographic libraries for secure data handling, may experience service outages or degraded performance. The lack of impact on confidentiality and integrity limits the risk of data breaches, but operational disruptions could lead to financial losses, reputational damage, and regulatory scrutiny under frameworks like GDPR if service availability is compromised. Organizations with high transaction volumes or real-time processing requirements are particularly vulnerable to performance degradation caused by this vulnerability.
Mitigation Recommendations
Immediate mitigation involves implementing input validation to restrict the maximum allowable p2c value to a safe threshold, preventing excessive CPU consumption. Organizations should monitor usage patterns for unusually high iteration counts in PBES2 operations and apply rate limiting or anomaly detection to mitigate potential abuse. Since no official patch is currently available, consider isolating or sandboxing components using latchset jose to limit the impact of potential DoS attacks. Engage with the library maintainers to track patch releases and plan timely updates once available. Additionally, review cryptographic usage policies to ensure that password-based encryption parameters are configured securely and do not allow untrusted input to control iteration counts. Incorporating these measures into secure development and deployment practices will reduce exposure until a formal fix is released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2023-12-17T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a3b5fff58c9332ff09317
Added to database: 11/4/2025, 5:43:59 PM
Last enriched: 11/11/2025, 6:27:59 PM
Last updated: 12/18/2025, 12:02:23 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14837: Code Injection in ZZCMS
MediumCVE-2025-14836: Cleartext Storage in a File or on Disk in ZZCMS
MediumCVE-2025-14834: SQL Injection in code-projects Simple Stock System
MediumCVE-2025-68435: CWE-305: Authentication Bypass by Primary Weakness in nicotsx zerobyte
CriticalCVE-2025-68433: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in zed-industries zed
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.