Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45167: n/a

0
Critical
VulnerabilityCVE-2024-45167cvecve-2024-45167
Published: Thu Aug 22 2024 (08/22/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in UCI IDOL 2 (aka uciIDOL or IDOL2) through 2.12. Due to improper input validation, improper deserialization, and improper restriction of operations within the bounds of a memory buffer, IDOL2 is vulnerable to Denial-of-Service (DoS) attacks and possibly remote code execution. A certain XmlMessage document causes 100% CPU consumption.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:06:49 UTC

Technical Analysis

CVE-2024-45167 affects UCI IDOL 2 (also known as uciIDOL or IDOL2) through version 2.12 and stems from multiple security weaknesses: improper input validation, improper deserialization, and insufficient restrictions on operations within memory buffer bounds. These issues allow specially crafted XmlMessage documents to cause excessive CPU consumption, resulting in Denial-of-Service (DoS) conditions. Moreover, the vulnerability may enable remote code execution (RCE), allowing attackers to execute arbitrary code on affected systems. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact spans confidentiality, integrity, and availability, making it a comprehensive threat. Although no public exploits have been observed yet, the vulnerability's characteristics suggest that exploitation could be straightforward once weaponized. The root causes relate to CWE-20 (Improper Input Validation), which is a common source of severe security issues. No official patches or mitigations are currently listed, emphasizing the need for vigilance and proactive defense measures.

Potential Impact

The vulnerability can cause complete denial of service by maxing out CPU resources, potentially disrupting critical services relying on UCI IDOL 2. If remote code execution is achieved, attackers could gain control over affected systems, leading to data breaches, system manipulation, or lateral movement within networks. The lack of authentication and user interaction requirements means attackers can exploit this remotely and autonomously, increasing the attack surface. Organizations using IDOL2 in sensitive environments such as government, finance, or critical infrastructure could face severe operational disruptions and data compromise. The broad impact on confidentiality, integrity, and availability elevates the threat to critical levels, potentially affecting business continuity and regulatory compliance.

Mitigation Recommendations

Until official patches are released, organizations should implement network-level protections such as strict firewall rules to limit access to UCI IDOL 2 services only to trusted IP addresses. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics to detect anomalous XmlMessage traffic patterns. Conduct thorough input validation and sanitization on any interfaces interacting with IDOL2 if possible. Monitor CPU usage and system logs for unusual spikes or behavior indicative of exploitation attempts. Segment networks to isolate critical IDOL2 deployments from broader enterprise networks to contain potential compromises. Engage with the vendor for timely updates and apply patches immediately upon availability. Consider temporary disabling or restricting vulnerable features if feasible. Perform regular security assessments and penetration testing focused on deserialization and input validation weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ce8b7ef31ef0b56a17a

Added to database: 2/25/2026, 9:43:04 PM

Last enriched: 2/26/2026, 8:06:49 AM

Last updated: 4/12/2026, 7:55:42 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses