Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-51775: n/a

0
Medium
VulnerabilityCVE-2023-51775cvecve-2023-51775
Published: Mon Dec 25 2023 (12/25/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

The jose4j component before 0.9.4 for Java allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:17:45 UTC

Technical Analysis

CVE-2023-51775 is a denial of service vulnerability identified in the jose4j Java library, specifically affecting versions prior to 0.9.4. The flaw arises from the handling of the p2c (PBES2 Count) parameter used in password-based encryption schemes. An attacker can supply an excessively large p2c value, which causes the library to perform an inordinate number of cryptographic iterations, leading to excessive CPU consumption and effectively a denial of service condition. This vulnerability is categorized under CWE-400 (Uncontrolled Resource Consumption). The attack vector is network-based and requires low privileges, with no user interaction needed, making it relatively easy to exploit in environments where jose4j is used for cryptographic operations. The CVSS v3.1 score is 6.5, reflecting a medium severity due to the impact on availability without affecting confidentiality or integrity. No patches were linked in the provided data, but the fixed version is 0.9.4 or later. No known exploits have been reported in the wild yet, but the vulnerability poses a risk to applications relying on jose4j for secure cryptographic functions, especially those exposed to untrusted inputs.

Potential Impact

For European organizations, this vulnerability primarily threatens the availability of services that utilize the jose4j library for cryptographic operations, such as secure token processing or encryption workflows. A successful attack can lead to denial of service by exhausting CPU resources, potentially causing application crashes or degraded performance. This can disrupt business-critical applications, especially in sectors like finance, healthcare, and government, where cryptographic security is essential. The vulnerability does not compromise data confidentiality or integrity but can indirectly affect operational continuity and service reliability. Organizations with internet-facing Java applications or APIs using jose4j are at higher risk. The medium severity indicates a moderate but non-trivial impact, emphasizing the need for timely remediation to avoid service interruptions and maintain compliance with European data protection and operational resilience regulations.

Mitigation Recommendations

The primary mitigation is to upgrade the jose4j library to version 0.9.4 or later, where this vulnerability is addressed. If immediate upgrading is not feasible, organizations should implement input validation to restrict the p2c parameter to reasonable values, preventing excessively large iteration counts. Additionally, applying resource usage limits or timeouts on cryptographic operations can help mitigate CPU exhaustion risks. Monitoring application performance and CPU usage for anomalies can provide early detection of exploitation attempts. Network-level protections such as rate limiting and filtering suspicious requests targeting cryptographic endpoints can reduce exposure. Finally, ensure secure coding practices and regular dependency audits to identify and remediate vulnerable components promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-12-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092638fe7723195e0b62f9

Added to database: 11/3/2025, 10:01:28 PM

Last enriched: 11/3/2025, 10:17:45 PM

Last updated: 11/3/2025, 11:38:50 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats