Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21634: CWE-770: Allocation of Resources Without Limits or Throttling in amazon-ion ion-java

0
High
VulnerabilityCVE-2024-21634cvecve-2024-21634cwe-770
Published: Wed Jan 03 2024 (01/03/2024, 22:46:03 UTC)
Source: CVE Database V5
Vendor/Project: amazon-ion
Product: ion-java

Description

Amazon Ion is a Java implementation of the Ion data notation. Prior to version 1.10.5, a potential denial-of-service issue exists in `ion-java` for applications that use `ion-java` to deserialize Ion text encoded data, or deserialize Ion text or binary encoded data into the `IonValue` model and then invoke certain `IonValue` methods on that in-memory representation. An actor could craft Ion data that, when loaded by the affected application and/or processed using the `IonValue` model, results in a `StackOverflowError` originating from the `ion-java` library. The patch is included in `ion-java` 1.10.5. As a workaround, do not load data which originated from an untrusted source or that could have been tampered with.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:52:24 UTC

Technical Analysis

CVE-2024-21634 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the amazon-ion Java library (ion-java) before version 1.10.5. Amazon Ion is a data serialization format and ion-java is its Java implementation used to deserialize Ion text or binary encoded data into an in-memory IonValue model. The vulnerability manifests when an attacker crafts malicious Ion data that, upon deserialization and subsequent method invocation on the IonValue object, triggers excessive recursive calls or unbounded resource consumption leading to a StackOverflowError. This error results in a denial-of-service (DoS) condition by crashing or destabilizing the affected application. The flaw does not require any privileges or user interaction and can be exploited remotely by supplying malicious Ion data to the vulnerable application. The CVSS v3.1 score is 7.5, reflecting high severity due to network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability. No known exploits have been reported in the wild yet. The vulnerability is patched in ion-java version 1.10.5, and the recommended mitigation is to upgrade to this or later versions. As a temporary workaround, applications should avoid loading Ion data from untrusted or potentially tampered sources to prevent exploitation.

Potential Impact

For European organizations, the primary impact is denial of service affecting availability of applications that utilize ion-java for processing Ion data. This can disrupt business operations, especially in sectors relying on real-time data processing, cloud services, or microservices architectures that use Ion serialization. The vulnerability does not compromise confidentiality or integrity but can cause application crashes or service outages, potentially leading to financial losses, reputational damage, and regulatory scrutiny under laws like GDPR if service availability is critical. Organizations in finance, e-commerce, telecommunications, and cloud service providers in Europe are particularly at risk if they use affected versions of ion-java. The lack of authentication or user interaction requirements means attackers can exploit this remotely, increasing the threat surface. Although no active exploits are known, the high CVSS score and ease of exploitation warrant prompt remediation to avoid potential future attacks.

Mitigation Recommendations

1. Upgrade all instances of ion-java to version 1.10.5 or later immediately to apply the official patch addressing this vulnerability. 2. Implement strict input validation and filtering to reject Ion data from untrusted or unauthenticated sources before deserialization. 3. Employ runtime application monitoring to detect abnormal resource consumption or crashes related to Ion data processing. 4. Use application-layer firewalls or API gateways to restrict or inspect incoming Ion data payloads, blocking suspicious or malformed inputs. 5. Conduct code audits and dependency scans to identify all usages of ion-java and ensure no legacy versions remain in production or development environments. 6. Develop incident response plans that include steps to isolate and recover from DoS conditions caused by this vulnerability. 7. Educate developers and security teams about safe deserialization practices and the risks of processing untrusted data formats like Ion. 8. Where possible, sandbox or isolate components handling Ion data to limit the impact of potential crashes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2023-12-29T03:00:44.955Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909261dfe7723195e0b4162

Added to database: 11/3/2025, 10:01:01 PM

Last enriched: 11/3/2025, 11:52:24 PM

Last updated: 11/5/2025, 2:10:14 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats