CVE-2024-29371: n/a
In jose4j before 0.9.5, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.
AI Analysis
Technical Summary
CVE-2024-29371 is a vulnerability identified in the jose4j Java library, which is widely used for handling JSON Web Encryption (JWE) tokens. The flaw exists in versions prior to 0.9.5 and allows an attacker to craft a malicious JWE token that has an exceptionally high compression ratio. When such a token is processed by a vulnerable server, the decompression step consumes excessive memory and CPU resources, causing a denial-of-service (DoS) condition. This occurs because the decompression algorithm expands the compressed data to a size far larger than the original input, overwhelming system resources. The attack does not require authentication or user interaction, making it easier to execute remotely. Although no public exploits have been reported yet, the vulnerability poses a significant risk to availability for any service relying on jose4j for secure token processing. The absence of a CVSS score indicates the need for a severity assessment based on the impact and exploitability factors. The vulnerability affects the confidentiality and integrity minimally but severely impacts availability by enabling resource exhaustion. The scope includes all systems processing JWE tokens with vulnerable jose4j versions. The vulnerability is particularly relevant for web applications, APIs, and microservices that use jose4j for encryption and token validation.
Potential Impact
For European organizations, this vulnerability can lead to service outages and degraded performance in applications that rely on jose4j for JSON Web Encryption. Critical services such as identity providers, single sign-on systems, and API gateways using jose4j could be targeted to disrupt operations. The DoS condition can affect availability, potentially causing downtime and loss of business continuity. This may also lead to reputational damage and compliance issues, especially under regulations like GDPR that mandate service availability and data protection. Organizations in sectors such as finance, healthcare, and government, which often use secure token-based authentication, are particularly vulnerable. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits given the public disclosure. The impact is amplified in environments with high traffic volumes or limited resource capacity, common in many European enterprises and public sector deployments.
Mitigation Recommendations
The primary mitigation is to upgrade jose4j to version 0.9.5 or later, where this vulnerability has been addressed. Organizations should audit their software dependencies to identify any usage of vulnerable jose4j versions. Implementing strict resource limits and timeouts on decompression operations can help reduce the risk of resource exhaustion. Deploying Web Application Firewalls (WAFs) with rules to detect and block anomalous JWE tokens with suspicious compression ratios can provide an additional layer of defense. Monitoring system resource usage and setting alerts for unusual spikes during token processing can enable early detection of exploitation attempts. Security teams should also review and harden token validation logic to reject malformed or suspicious tokens before decompression. Finally, organizations should maintain an incident response plan to quickly mitigate DoS attacks and communicate with stakeholders.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2024-29371: n/a
Description
In jose4j before 0.9.5, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.
AI-Powered Analysis
Technical Analysis
CVE-2024-29371 is a vulnerability identified in the jose4j Java library, which is widely used for handling JSON Web Encryption (JWE) tokens. The flaw exists in versions prior to 0.9.5 and allows an attacker to craft a malicious JWE token that has an exceptionally high compression ratio. When such a token is processed by a vulnerable server, the decompression step consumes excessive memory and CPU resources, causing a denial-of-service (DoS) condition. This occurs because the decompression algorithm expands the compressed data to a size far larger than the original input, overwhelming system resources. The attack does not require authentication or user interaction, making it easier to execute remotely. Although no public exploits have been reported yet, the vulnerability poses a significant risk to availability for any service relying on jose4j for secure token processing. The absence of a CVSS score indicates the need for a severity assessment based on the impact and exploitability factors. The vulnerability affects the confidentiality and integrity minimally but severely impacts availability by enabling resource exhaustion. The scope includes all systems processing JWE tokens with vulnerable jose4j versions. The vulnerability is particularly relevant for web applications, APIs, and microservices that use jose4j for encryption and token validation.
Potential Impact
For European organizations, this vulnerability can lead to service outages and degraded performance in applications that rely on jose4j for JSON Web Encryption. Critical services such as identity providers, single sign-on systems, and API gateways using jose4j could be targeted to disrupt operations. The DoS condition can affect availability, potentially causing downtime and loss of business continuity. This may also lead to reputational damage and compliance issues, especially under regulations like GDPR that mandate service availability and data protection. Organizations in sectors such as finance, healthcare, and government, which often use secure token-based authentication, are particularly vulnerable. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits given the public disclosure. The impact is amplified in environments with high traffic volumes or limited resource capacity, common in many European enterprises and public sector deployments.
Mitigation Recommendations
The primary mitigation is to upgrade jose4j to version 0.9.5 or later, where this vulnerability has been addressed. Organizations should audit their software dependencies to identify any usage of vulnerable jose4j versions. Implementing strict resource limits and timeouts on decompression operations can help reduce the risk of resource exhaustion. Deploying Web Application Firewalls (WAFs) with rules to detect and block anomalous JWE tokens with suspicious compression ratios can provide an additional layer of defense. Monitoring system resource usage and setting alerts for unusual spikes during token processing can enable early detection of exploitation attempts. Security teams should also review and harden token validation logic to reject malformed or suspicious tokens before decompression. Finally, organizations should maintain an incident response plan to quickly mitigate DoS attacks and communicate with stakeholders.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2024-03-19T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6942d536b2cbfb3efaa86de5
Added to database: 12/17/2025, 4:07:18 PM
Last enriched: 12/17/2025, 4:23:03 PM
Last updated: 12/18/2025, 7:07:12 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68459: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Ruijie Networks Co., Ltd. AP180-PE V3.xx
HighCVE-2025-47387: CWE-822 Untrusted Pointer Dereference in Qualcomm, Inc. Snapdragon
HighCVE-2025-47382: CWE-863: Incorrect Authorization in Qualcomm, Inc. Snapdragon
HighCVE-2025-47372: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon
CriticalCVE-2025-47350: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.