CVE-2024-34703: CWE-405: Asymmetric Resource Consumption (Amplification) in randombit botan
Botan is a C++ cryptography library. X.509 certificates can identify elliptic curves using either an object identifier or using explicit encoding of the parameters. Prior to versions 3.3.0 and 2.19.4, an attacker could present an ECDSA X.509 certificate using explicit encoding where the parameters are very large. The proof of concept used a 16Kbit prime for this purpose. When parsing, the parameter is checked to be prime, causing excessive computation. This was patched in 2.19.4 and 3.3.0 to allow the prime parameter of the elliptic curve to be at most 521 bits. No known workarounds are available. Note that support for explicit encoding of elliptic curve parameters is deprecated in Botan.
AI Analysis
Technical Summary
CVE-2024-34703 is a vulnerability in the Botan cryptography library, specifically in how it parses elliptic curve parameters in ECDSA X.509 certificates. Botan supports two ways to identify elliptic curves: via object identifiers or explicit parameter encoding. The vulnerability arises when an attacker supplies a certificate with explicitly encoded elliptic curve parameters containing an excessively large prime number (demonstrated with a 16Kbit prime). Botan performs primality checks on this parameter during parsing, which is computationally expensive and can cause significant resource exhaustion. This asymmetric resource consumption can be exploited remotely without authentication or user interaction, leading to denial of service (DoS) conditions. The issue affects Botan versions from 3.0.0-alpha0 up to but not including 3.3.0, and versions below 2.19.4. The maintainers patched the vulnerability by restricting the maximum allowed prime size to 521 bits and deprecating explicit parameter encoding support. No known workarounds exist, making upgrading the only effective mitigation. The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and a high impact on availability but no impact on confidentiality or integrity.
Potential Impact
For European organizations, this vulnerability poses a significant risk of denial of service in systems relying on Botan for cryptographic operations involving ECDSA X.509 certificates. Services that parse external certificates, such as TLS termination points, VPN gateways, or certificate validation services, could be targeted with malicious certificates to exhaust CPU resources, causing service outages or degraded performance. This can disrupt business operations, especially in sectors like finance, healthcare, and critical infrastructure where secure communications are essential. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can lead to cascading operational failures and potential regulatory non-compliance under EU cybersecurity directives. Organizations using outdated Botan versions in embedded devices or software libraries are particularly vulnerable. The lack of known exploits in the wild suggests limited immediate threat, but the ease of exploitation and network exposure warrant prompt attention.
Mitigation Recommendations
The primary mitigation is to upgrade Botan to version 3.3.0 or 2.19.4 or later, where the vulnerability is patched by limiting prime parameter sizes and deprecating explicit elliptic curve parameter encoding. Organizations should audit their software dependencies to identify Botan usage, especially in cryptographic modules handling X.509 certificates. If upgrading is not immediately feasible, implement network-level protections such as filtering or blocking suspicious certificates with unusually large parameters, though this may be challenging without deep packet inspection capabilities. Monitoring CPU usage and establishing anomaly detection for cryptographic services can help identify exploitation attempts. Additionally, consider disabling support for explicit elliptic curve parameter encoding if configurable, as this feature is deprecated and the attack vector. Coordinate with software vendors and maintainers to ensure timely patch deployment. Finally, review certificate validation policies to reject certificates with non-standard or suspicious parameters.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2024-34703: CWE-405: Asymmetric Resource Consumption (Amplification) in randombit botan
Description
Botan is a C++ cryptography library. X.509 certificates can identify elliptic curves using either an object identifier or using explicit encoding of the parameters. Prior to versions 3.3.0 and 2.19.4, an attacker could present an ECDSA X.509 certificate using explicit encoding where the parameters are very large. The proof of concept used a 16Kbit prime for this purpose. When parsing, the parameter is checked to be prime, causing excessive computation. This was patched in 2.19.4 and 3.3.0 to allow the prime parameter of the elliptic curve to be at most 521 bits. No known workarounds are available. Note that support for explicit encoding of elliptic curve parameters is deprecated in Botan.
AI-Powered Analysis
Technical Analysis
CVE-2024-34703 is a vulnerability in the Botan cryptography library, specifically in how it parses elliptic curve parameters in ECDSA X.509 certificates. Botan supports two ways to identify elliptic curves: via object identifiers or explicit parameter encoding. The vulnerability arises when an attacker supplies a certificate with explicitly encoded elliptic curve parameters containing an excessively large prime number (demonstrated with a 16Kbit prime). Botan performs primality checks on this parameter during parsing, which is computationally expensive and can cause significant resource exhaustion. This asymmetric resource consumption can be exploited remotely without authentication or user interaction, leading to denial of service (DoS) conditions. The issue affects Botan versions from 3.0.0-alpha0 up to but not including 3.3.0, and versions below 2.19.4. The maintainers patched the vulnerability by restricting the maximum allowed prime size to 521 bits and deprecating explicit parameter encoding support. No known workarounds exist, making upgrading the only effective mitigation. The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and a high impact on availability but no impact on confidentiality or integrity.
Potential Impact
For European organizations, this vulnerability poses a significant risk of denial of service in systems relying on Botan for cryptographic operations involving ECDSA X.509 certificates. Services that parse external certificates, such as TLS termination points, VPN gateways, or certificate validation services, could be targeted with malicious certificates to exhaust CPU resources, causing service outages or degraded performance. This can disrupt business operations, especially in sectors like finance, healthcare, and critical infrastructure where secure communications are essential. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can lead to cascading operational failures and potential regulatory non-compliance under EU cybersecurity directives. Organizations using outdated Botan versions in embedded devices or software libraries are particularly vulnerable. The lack of known exploits in the wild suggests limited immediate threat, but the ease of exploitation and network exposure warrant prompt attention.
Mitigation Recommendations
The primary mitigation is to upgrade Botan to version 3.3.0 or 2.19.4 or later, where the vulnerability is patched by limiting prime parameter sizes and deprecating explicit elliptic curve parameter encoding. Organizations should audit their software dependencies to identify Botan usage, especially in cryptographic modules handling X.509 certificates. If upgrading is not immediately feasible, implement network-level protections such as filtering or blocking suspicious certificates with unusually large parameters, though this may be challenging without deep packet inspection capabilities. Monitoring CPU usage and establishing anomaly detection for cryptographic services can help identify exploitation attempts. Additionally, consider disabling support for explicit elliptic curve parameter encoding if configurable, as this feature is deprecated and the attack vector. Coordinate with software vendors and maintainers to ensure timely patch deployment. Finally, review certificate validation policies to reject certificates with non-standard or suspicious parameters.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2024-05-07T13:53:00.132Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697d10c0ac0632022277c287
Added to database: 1/30/2026, 8:12:48 PM
Last enriched: 1/30/2026, 8:27:09 PM
Last updated: 2/7/2026, 11:17:06 PM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2115: SQL Injection in itsourcecode Society Management System
MediumCVE-2026-2114: SQL Injection in itsourcecode Society Management System
MediumCVE-2026-25858: CWE-640 Weak Password Recovery Mechanism for Forgotten Password in macrozheng mall
CriticalCVE-2026-25857: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shenzhen Tenda Technology Tenda G300-F
HighCVE-2025-15564: Divide By Zero in Mapnik
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.