Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34703: CWE-405: Asymmetric Resource Consumption (Amplification) in randombit botan

0
High
VulnerabilityCVE-2024-34703cvecve-2024-34703cwe-405cwe-770
Published: Sun Jun 30 2024 (06/30/2024, 20:22:32 UTC)
Source: CVE Database V5
Vendor/Project: randombit
Product: botan

Description

Botan is a C++ cryptography library. X.509 certificates can identify elliptic curves using either an object identifier or using explicit encoding of the parameters. Prior to versions 3.3.0 and 2.19.4, an attacker could present an ECDSA X.509 certificate using explicit encoding where the parameters are very large. The proof of concept used a 16Kbit prime for this purpose. When parsing, the parameter is checked to be prime, causing excessive computation. This was patched in 2.19.4 and 3.3.0 to allow the prime parameter of the elliptic curve to be at most 521 bits. No known workarounds are available. Note that support for explicit encoding of elliptic curve parameters is deprecated in Botan.

AI-Powered Analysis

AILast updated: 01/30/2026, 20:27:09 UTC

Technical Analysis

CVE-2024-34703 is a vulnerability in the Botan cryptography library, specifically in how it parses elliptic curve parameters in ECDSA X.509 certificates. Botan supports two ways to identify elliptic curves: via object identifiers or explicit parameter encoding. The vulnerability arises when an attacker supplies a certificate with explicitly encoded elliptic curve parameters containing an excessively large prime number (demonstrated with a 16Kbit prime). Botan performs primality checks on this parameter during parsing, which is computationally expensive and can cause significant resource exhaustion. This asymmetric resource consumption can be exploited remotely without authentication or user interaction, leading to denial of service (DoS) conditions. The issue affects Botan versions from 3.0.0-alpha0 up to but not including 3.3.0, and versions below 2.19.4. The maintainers patched the vulnerability by restricting the maximum allowed prime size to 521 bits and deprecating explicit parameter encoding support. No known workarounds exist, making upgrading the only effective mitigation. The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and a high impact on availability but no impact on confidentiality or integrity.

Potential Impact

For European organizations, this vulnerability poses a significant risk of denial of service in systems relying on Botan for cryptographic operations involving ECDSA X.509 certificates. Services that parse external certificates, such as TLS termination points, VPN gateways, or certificate validation services, could be targeted with malicious certificates to exhaust CPU resources, causing service outages or degraded performance. This can disrupt business operations, especially in sectors like finance, healthcare, and critical infrastructure where secure communications are essential. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can lead to cascading operational failures and potential regulatory non-compliance under EU cybersecurity directives. Organizations using outdated Botan versions in embedded devices or software libraries are particularly vulnerable. The lack of known exploits in the wild suggests limited immediate threat, but the ease of exploitation and network exposure warrant prompt attention.

Mitigation Recommendations

The primary mitigation is to upgrade Botan to version 3.3.0 or 2.19.4 or later, where the vulnerability is patched by limiting prime parameter sizes and deprecating explicit elliptic curve parameter encoding. Organizations should audit their software dependencies to identify Botan usage, especially in cryptographic modules handling X.509 certificates. If upgrading is not immediately feasible, implement network-level protections such as filtering or blocking suspicious certificates with unusually large parameters, though this may be challenging without deep packet inspection capabilities. Monitoring CPU usage and establishing anomaly detection for cryptographic services can help identify exploitation attempts. Additionally, consider disabling support for explicit elliptic curve parameter encoding if configurable, as this feature is deprecated and the attack vector. Coordinate with software vendors and maintainers to ensure timely patch deployment. Finally, review certificate validation policies to reject certificates with non-standard or suspicious parameters.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2024-05-07T13:53:00.132Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697d10c0ac0632022277c287

Added to database: 1/30/2026, 8:12:48 PM

Last enriched: 1/30/2026, 8:27:09 PM

Last updated: 2/7/2026, 11:17:06 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats