Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28835: Uncaught Exception

0
Medium
VulnerabilityCVE-2024-28835cvecve-2024-28835
Published: Thu Mar 21 2024 (03/21/2024, 06:13:26 UTC)
Source: CVE

Description

A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "certtool --verify-chain" command.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:30:12 UTC

Technical Analysis

CVE-2024-28835 is a vulnerability identified in GnuTLS version 3.8.3, a widely used open-source library implementing TLS protocols. The issue arises from an uncaught exception that occurs when the certtool utility attempts to verify a specially crafted .pem certificate bundle using the --verify-chain command. This crafted input triggers an application crash, resulting in a denial of service condition. The vulnerability does not affect confidentiality or integrity but impacts availability by causing the certtool process to terminate unexpectedly. The CVSS 3.1 base score is 5.0 (medium), reflecting that exploitation requires local access (AV:L), low attack complexity (AC:L), low privileges (PR:L), and user interaction (UI:R). The scope remains unchanged (S:U), and the impact is limited to availability (A:H) with no confidentiality or integrity loss. No known exploits have been reported in the wild, and no patches are currently linked, indicating that remediation may require monitoring for vendor updates or applying manual mitigations. This vulnerability is relevant for environments where GnuTLS 3.8.3 is used for certificate verification, especially in automated or scripted certificate validation workflows. An attacker with local access could craft malicious .pem bundles to crash certtool, potentially disrupting certificate management or automated security processes.

Potential Impact

The primary impact of CVE-2024-28835 is denial of service through application crashes during certificate verification. Organizations using GnuTLS 3.8.3 in their security infrastructure, particularly those automating certificate validation with certtool, may experience service interruptions or failures in certificate chain verification processes. This can affect system availability and reliability, potentially delaying security operations or automated deployments that depend on certificate validation. Since exploitation requires local privileges and user interaction, the risk of remote exploitation is low, but insider threats or compromised local accounts could leverage this flaw to disrupt operations. The vulnerability does not expose sensitive data or allow unauthorized data modification, limiting its impact to availability. However, in environments with high dependency on GnuTLS for secure communications and certificate management, even temporary denial of service can have operational consequences. Critical infrastructure, financial institutions, and large enterprises with automated certificate workflows are particularly at risk of disruption.

Mitigation Recommendations

To mitigate CVE-2024-28835, organizations should monitor for and apply official patches or updates from GnuTLS maintainers as soon as they become available. Until a patch is released, restrict access to the certtool utility to trusted users only, minimizing the risk of malicious .pem bundle processing. Implement input validation and sanitization for certificate bundles before verification to detect and block malformed or suspicious files. Consider running certtool verification processes with reduced privileges and in isolated environments to limit the impact of crashes. Incorporate monitoring and alerting for certtool crashes or abnormal termination events to enable rapid response. Review and harden local user account controls to prevent unauthorized local access that could exploit this vulnerability. For automated workflows, add error handling to gracefully manage certtool failures and avoid cascading disruptions. Finally, maintain an inventory of systems running GnuTLS 3.8.3 to prioritize remediation efforts effectively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-03-11T14:43:43.973Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682df35bc4522896dcc06593

Added to database: 5/21/2025, 3:38:03 PM

Last enriched: 2/28/2026, 10:30:12 AM

Last updated: 3/25/2026, 4:20:47 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses