Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31669: n/a

0
High
VulnerabilityCVE-2024-31669cvecve-2024-31669
Published: Mon Dec 02 2024 (12/02/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

rizin before Release v0.6.3 is vulnerable to Uncontrolled Resource Consumption via bin_pe_parse_imports, Pe_r_bin_pe_parse_var, and estimate_slide.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 12:28:00 UTC

Technical Analysis

CVE-2024-31669 is a vulnerability identified in the rizin reverse engineering framework before version 0.6.3. The issue stems from uncontrolled resource consumption within specific functions responsible for parsing Portable Executable (PE) files: bin_pe_parse_imports, Pe_r_bin_pe_parse_var, and estimate_slide. These functions, when processing crafted or malformed PE files, can cause excessive consumption of system resources such as CPU or memory, leading to denial of service (DoS) conditions. The vulnerability is classified under CWE-770 (Allocation of Resources Without Limits or Throttling), indicating that the software does not properly limit resource usage during parsing operations. The CVSS v3.1 base score is 7.5, reflecting a high severity level, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H). This means an attacker can remotely trigger the vulnerability without authentication or user interaction, causing service disruption. No known exploits have been reported in the wild yet, but the potential for denial of service makes this a critical issue for users relying on rizin for binary analysis tasks. The lack of available patches at the time of reporting necessitates vigilance and proactive mitigation by users.

Potential Impact

The primary impact of CVE-2024-31669 is denial of service due to uncontrolled resource consumption. Organizations using rizin for reverse engineering, malware analysis, or software debugging may experience service outages or degraded performance when processing maliciously crafted PE files. This can disrupt security operations, delay incident response, and reduce productivity. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized modifications are unlikely. However, the availability impact can be significant, especially in environments where rizin is integrated into automated analysis pipelines or continuous integration systems. The ease of exploitation (no authentication or user interaction required) increases the risk of widespread attacks if threat actors develop exploits. The absence of known exploits currently limits immediate risk, but the potential for future exploitation remains. Organizations relying on rizin should consider the operational impact of potential downtime and plan accordingly.

Mitigation Recommendations

To mitigate CVE-2024-31669, organizations should: 1) Upgrade rizin to version 0.6.3 or later as soon as the patch becomes available to address the uncontrolled resource consumption issue. 2) Until patches are applied, implement resource usage monitoring and limits on systems running rizin, such as CPU and memory quotas, to prevent service disruption from malformed inputs. 3) Restrict access to rizin services and interfaces to trusted users and networks to reduce exposure to crafted PE files from untrusted sources. 4) Employ input validation or sandboxing techniques when processing PE files to detect and isolate potentially malicious files before full parsing. 5) Monitor security advisories and threat intelligence feeds for updates on exploit development or additional mitigation strategies. 6) Incorporate anomaly detection for unusual resource consumption patterns during binary analysis workflows. These targeted actions go beyond generic advice by focusing on operational controls and proactive monitoring specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dd5b7ef31ef0b58f070

Added to database: 2/25/2026, 9:47:01 PM

Last enriched: 2/26/2026, 12:28:00 PM

Last updated: 4/12/2026, 1:59:40 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses