Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23078: n/a

0
Critical
VulnerabilityCVE-2024-23078cvecve-2024-23078
Published: Mon Apr 08 2024 (04/08/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

JGraphT Core v1.5.2 was discovered to contain a NullPointerException via the component org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:18:46 UTC

Technical Analysis

CVE-2024-23078 concerns a reported vulnerability in the JGraphT Core library version 1.5.2, specifically within the ToleranceDoubleComparator::compare(Double, Double) method. The issue is a NullPointerException (CWE-476) that may be triggered when the comparator attempts to compare Double objects, potentially leading to an unhandled exception and application crash. This type of flaw can be exploited remotely without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact includes a high confidentiality loss and high availability impact, suggesting that the flaw could be leveraged to disrupt services or cause denial of service conditions. However, the vulnerability's existence is contested by multiple security researchers who question the validity of the initial report, citing insufficient evidence and possible inaccuracies from automated vulnerability detection tools. No patches or fixes have been released, and no active exploitation has been observed. The vulnerability affects software projects that incorporate JGraphT Core 1.5.2, a widely used Java library for graph data structures and algorithms, which is common in academic, research, and enterprise applications involving complex graph computations.

Potential Impact

If exploited, this vulnerability could cause applications using JGraphT Core 1.5.2 to crash unexpectedly due to unhandled NullPointerExceptions, resulting in denial of service. This could disrupt critical services relying on graph computations, such as network analysis, logistics, or recommendation engines. The high CVSS score reflects the potential for significant availability impact and confidentiality loss if the application handles sensitive data during processing. Since exploitation does not require authentication or user interaction, attackers could remotely trigger the fault, increasing the risk surface. However, the disputed nature of the vulnerability and lack of known exploits reduce the immediate threat level. Organizations that depend heavily on JGraphT for critical infrastructure or data processing should consider the risk seriously, as denial of service in these contexts could lead to operational downtime, financial loss, or reputational damage.

Mitigation Recommendations

Until an official patch is released, organizations should audit their use of JGraphT Core 1.5.2, particularly focusing on the ToleranceDoubleComparator usage. Developers should implement defensive programming techniques such as null checks before invoking the compare method to prevent NullPointerExceptions. Incorporating exception handling around graph comparison operations can help maintain application stability. Monitoring application logs for unexpected crashes or NullPointerExceptions related to this component is advised. Where feasible, consider upgrading to a later version of JGraphT if available or applying community-suggested patches or workarounds. Additionally, isolating critical graph processing components and employing runtime application self-protection (RASP) or web application firewalls (WAFs) can help detect and mitigate exploitation attempts. Engage with the JGraphT community or maintainers for updates and official fixes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d51b7ef31ef0b57043d

Added to database: 2/25/2026, 9:44:49 PM

Last enriched: 2/28/2026, 9:18:46 AM

Last updated: 4/12/2026, 7:54:44 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses