Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-57628: n/a

0
High
VulnerabilityCVE-2024-57628cvecve-2024-57628
Published: Tue Jan 14 2025 (01/14/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in the exp_values_set_supertype component of MonetDB Server v11.49.1 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 00:06:23 UTC

Technical Analysis

CVE-2024-57628 is a vulnerability identified in the exp_values_set_supertype component of MonetDB Server version 11.49.1. This flaw allows attackers to cause a Denial of Service (DoS) condition by submitting crafted SQL statements that exploit improper handling within this component. The vulnerability is classified under CWE-89, indicating it relates to improper neutralization of special elements used in an SQL command (SQL Injection). However, in this case, the impact is limited to availability disruption rather than data compromise. The CVSS v3.1 score is 7.5 (high), reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N/I:N), and high impact on availability (A:H). MonetDB is an open-source analytical database system used primarily for complex queries on large datasets, often in academic and research contexts. The vulnerability allows remote attackers to crash or hang the database server, causing denial of service and interrupting data processing workflows. No patches or fixes have been released at the time of publication, and no exploits have been observed in the wild, but the ease of exploitation and potential impact warrant immediate attention. Organizations using MonetDB should prepare to implement mitigations and monitor for suspicious activity.

Potential Impact

The primary impact of CVE-2024-57628 is denial of service, which can disrupt availability of MonetDB database services. This can lead to downtime in data analytics, research, or business intelligence operations relying on MonetDB, potentially delaying critical decision-making or research outcomes. Since the vulnerability does not affect confidentiality or integrity, data breach or manipulation risks are minimal. However, the ease of exploitation without authentication or user interaction means attackers can remotely cause service outages, which could be leveraged in broader attack campaigns or as part of multi-vector attacks. Organizations with high dependency on MonetDB for real-time or batch data processing may experience operational disruptions, loss of productivity, and reputational damage. The lack of current patches increases exposure until fixes are released and applied.

Mitigation Recommendations

To mitigate CVE-2024-57628, organizations should immediately restrict network access to MonetDB servers, limiting connections to trusted hosts and networks via firewall rules or network segmentation. Implement strict access controls and monitor SQL query logs for unusual or malformed statements targeting the exp_values_set_supertype component. Employ intrusion detection systems (IDS) or database activity monitoring (DAM) tools to detect anomalous query patterns indicative of exploitation attempts. Until a patch is available, consider deploying rate limiting or query throttling to reduce the risk of DoS from crafted queries. Regularly check MonetDB project communications for security updates and apply patches promptly once released. Additionally, maintain up-to-date backups and have incident response plans ready to restore service quickly if an attack occurs. Engage with the MonetDB community or vendor for guidance and potential workarounds.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bd8b7ef31ef0b55b67c

Added to database: 2/25/2026, 9:38:32 PM

Last enriched: 2/28/2026, 12:06:23 AM

Last updated: 4/12/2026, 12:29:04 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses