Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-27355: n/a

0
High
VulnerabilityCVE-2024-27355cvecve-2024-27355
Published: Fri Mar 01 2024 (03/01/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in phpseclib 1.x before 1.0.23, 2.x before 2.0.47, and 3.x before 3.0.36. When processing the ASN.1 object identifier of a certificate, a sub identifier may be provided that leads to a denial of service (CPU consumption for decodeOID).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:01:02 UTC

Technical Analysis

CVE-2024-27355 is a vulnerability identified in the phpseclib library, versions 1.x prior to 1.0.23, 2.x prior to 2.0.47, and 3.x prior to 3.0.36. Phpseclib is a widely used pure PHP implementation of various cryptographic algorithms and protocols, often employed in web applications for secure communications and certificate handling. The vulnerability resides in the ASN.1 object identifier (OID) processing logic, specifically within the decodeOID function. ASN.1 OIDs are sequences of sub identifiers used to uniquely identify objects such as cryptographic algorithms or certificate attributes. An attacker can craft a malicious certificate or ASN.1 structure containing a sub identifier that triggers excessive CPU consumption during the decoding process. This results in a denial of service (DoS) condition by exhausting server resources, effectively making the service unresponsive. The vulnerability does not require any privileges or user interaction and can be triggered remotely by supplying a maliciously crafted certificate or data to the vulnerable phpseclib instance. The CVSS v3.1 base score is 7.5, reflecting high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability (DoS) with no direct confidentiality or integrity compromise. No public exploit code or active exploitation has been reported yet, but the vulnerability poses a significant risk to any system relying on vulnerable phpseclib versions for certificate or cryptographic processing. Mitigation involves upgrading phpseclib to versions 1.0.23, 2.0.47, or 3.0.36 and later, where the decodeOID function has been hardened against such resource exhaustion attacks.

Potential Impact

The primary impact of CVE-2024-27355 is denial of service through resource exhaustion, specifically high CPU consumption during ASN.1 OID decoding. Organizations using vulnerable phpseclib versions in their web applications or services that process certificates may experience service outages or degraded performance when exposed to crafted malicious inputs. This can disrupt critical operations, especially in environments relying on automated certificate validation or cryptographic functions, such as secure communications, authentication, or data encryption workflows. The vulnerability does not compromise data confidentiality or integrity but can cause significant operational downtime and potential cascading failures in dependent systems. Attackers can exploit this remotely without authentication or user interaction, increasing the risk of widespread disruption. The absence of known exploits in the wild currently limits immediate impact, but the ease of exploitation and high severity score indicate a strong potential for future attacks. Organizations with high availability requirements, such as financial institutions, cloud service providers, and government agencies, are particularly at risk of operational impact.

Mitigation Recommendations

1. Immediately upgrade phpseclib to version 1.0.23, 2.0.47, 3.0.36, or later, where the vulnerability has been patched. 2. Implement input validation and filtering to detect and block malformed or suspicious ASN.1 data before processing. 3. Employ rate limiting and resource usage monitoring on services that handle certificate parsing to detect abnormal CPU spikes indicative of exploitation attempts. 4. Use web application firewalls (WAFs) with custom rules to identify and block malicious payloads targeting ASN.1 parsing. 5. Conduct regular security audits and code reviews of cryptographic libraries and their usage within applications. 6. Isolate cryptographic processing in sandboxed environments to limit the impact of potential DoS attacks. 7. Maintain up-to-date threat intelligence to respond quickly if exploit code becomes available. 8. Educate development and operations teams about the risks of processing untrusted certificate data and the importance of timely patching.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d7bb7ef31ef0b576c30

Added to database: 2/25/2026, 9:45:31 PM

Last enriched: 2/26/2026, 11:01:02 AM

Last updated: 4/12/2026, 3:42:08 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses