Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25768: n/a

0
High
VulnerabilityCVE-2024-25768cvecve-2024-25768
Published: Mon Feb 26 2024 (02/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

OpenDMARC 1.4.2 contains a null pointer dereference vulnerability in /OpenDMARC/libopendmarc/opendmarc_policy.c.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:44:36 UTC

Technical Analysis

CVE-2024-25768 identifies a null pointer dereference vulnerability in OpenDMARC version 1.4.2, located in the opendmarc_policy.c source file. OpenDMARC is an open-source implementation of the DMARC email authentication protocol, used to validate incoming email messages against domain-based policies to prevent spoofing and phishing. The vulnerability arises when the software attempts to dereference a null pointer during policy evaluation, leading to a crash of the OpenDMARC process. This results in a denial of service (DoS) condition, as the service becomes unavailable to process further email authentication requests. The vulnerability can be triggered remotely without any authentication or user interaction, as it is exploitable over the network by sending crafted email messages that cause the null pointer dereference. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the ease of exploitation (network vector, low attack complexity) and the complete loss of availability for the affected service. There is no impact on confidentiality or integrity, as the vulnerability does not allow data leakage or unauthorized modification. No patches or fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability is classified under CWE-476 (NULL Pointer Dereference), a common software weakness that can lead to crashes and DoS conditions. Organizations relying on OpenDMARC for email security should be aware of this flaw and prepare to apply patches once available or implement workarounds to mitigate service disruption.

Potential Impact

The primary impact of CVE-2024-25768 is a denial of service against OpenDMARC services, which can disrupt email authentication workflows. This disruption can lead to increased susceptibility to phishing and spoofing attacks if DMARC validation is unavailable, potentially allowing malicious emails to bypass domain-based protections. Organizations that depend on OpenDMARC for enforcing DMARC policies may experience degraded email security posture and operational interruptions. The vulnerability does not compromise confidentiality or integrity, so data breaches or unauthorized data modifications are not direct consequences. However, the loss of availability in email authentication services can indirectly increase risk exposure to email-based threats. The ease of remote exploitation without authentication or user interaction means attackers can trigger the DoS condition at scale, potentially targeting critical email infrastructure. This can affect enterprises, email service providers, and hosting companies that utilize OpenDMARC, impacting global email communication reliability and trust.

Mitigation Recommendations

Until an official patch is released, organizations should consider the following specific mitigations: 1) Implement network-level filtering to restrict access to OpenDMARC services only to trusted mail servers and known IP addresses to reduce exposure to malicious inputs. 2) Monitor OpenDMARC logs and service health closely to detect crashes or unusual behavior indicative of exploitation attempts. 3) Deploy redundancy and failover mechanisms for email authentication services to maintain availability if one instance is disrupted. 4) Consider temporarily disabling OpenDMARC policy enforcement if the risk of DoS outweighs the benefits, while increasing monitoring for phishing attempts. 5) Engage with OpenDMARC maintainers and subscribe to security advisories to promptly apply patches once available. 6) Conduct internal code reviews or testing to identify if custom configurations or integrations exacerbate the vulnerability. These targeted actions go beyond generic advice by focusing on access control, monitoring, and resilience specific to OpenDMARC deployments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d6fb7ef31ef0b57220d

Added to database: 2/25/2026, 9:45:19 PM

Last enriched: 2/26/2026, 10:44:36 AM

Last updated: 4/12/2026, 1:36:12 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses