Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23079: n/a

0
Medium
VulnerabilityCVE-2024-23079cvecve-2024-23079
Published: Mon Apr 08 2024 (04/08/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

JGraphT Core v1.5.2 was discovered to contain a NullPointerException via the component org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:19:04 UTC

Technical Analysis

CVE-2024-23079 concerns a potential NullPointerException vulnerability in the open-source Java library JGraphT Core version 1.5.2, specifically within the ToleranceDoubleComparator class's compare method that compares Double objects. A NullPointerException occurs when the method attempts to dereference a null Double object, which can cause the application using this library to crash or terminate unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability was identified by automated tools but is contested by multiple security researchers who argue that the evidence is insufficient and the detection tool may have produced a false positive. The vulnerability is assigned a CVSS 3.1 score of 6.2, reflecting a medium severity with an attack vector limited to local access, low attack complexity, no privileges required, and no user interaction needed. The impact affects availability only, with no confidentiality or integrity loss. No patches or fixes have been published yet, and no known exploits are reported in the wild. The vulnerability is categorized under CWE-120 (Classic Buffer Overflow), although the exact nature here is a NullPointerException rather than a traditional buffer overflow. This suggests a coding error or insufficient null checks in the comparator method. Organizations leveraging JGraphT Core in their Java applications, especially those processing graph data or performing complex computations, should be aware of this issue and consider code review or runtime monitoring to detect potential crashes.

Potential Impact

The primary impact of this vulnerability is the potential for denial of service due to application crashes caused by unhandled NullPointerExceptions in the JGraphT Core library. This can disrupt services or processes relying on graph computations, potentially affecting availability of critical systems. Since the attack vector is local, exploitation requires an attacker to have access to the environment where the vulnerable library is used, limiting remote exploitation risks. There is no impact on confidentiality or integrity, so data breaches or unauthorized modifications are not a concern. However, availability disruptions in environments such as financial modeling, network analysis, or scientific computations that depend on JGraphT could lead to operational delays or failures. The lack of known exploits and patches reduces immediate risk, but organizations should remain vigilant. The disputed nature of the vulnerability means some organizations may prioritize monitoring over immediate remediation until further confirmation is available.

Mitigation Recommendations

1. Conduct a thorough code review of any usage of the ToleranceDoubleComparator::compare method in your applications to ensure null values are properly checked and handled before comparison. 2. Implement defensive programming practices by adding explicit null checks around Double objects passed to this comparator to prevent NullPointerExceptions. 3. Monitor application logs and runtime behavior for unexpected crashes or exceptions related to graph processing components. 4. If feasible, isolate or sandbox components using JGraphT Core to limit the impact of potential crashes on critical systems. 5. Stay updated with JGraphT project releases and security advisories for any patches or fixes addressing this issue. 6. Consider using alternative graph libraries or earlier/later versions of JGraphT if they are confirmed not vulnerable. 7. Limit local access to systems running vulnerable versions to trusted users only, reducing the risk of local exploitation. 8. Engage with the JGraphT community or maintainers for clarification on the disputed vulnerability status and recommended fixes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d51b7ef31ef0b570442

Added to database: 2/25/2026, 9:44:49 PM

Last enriched: 2/28/2026, 9:19:04 AM

Last updated: 4/11/2026, 11:21:40 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses