Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-57645: n/a

0
High
VulnerabilityCVE-2024-57645cvecve-2024-57645
Published: Tue Jan 14 2025 (01/14/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-57645 is a high-severity vulnerability in the qi_inst_state_free component of OpenLink Virtuoso OpenSource version 7. 2. 11. It allows unauthenticated remote attackers to cause a denial of service (DoS) by submitting specially crafted SQL statements. The vulnerability is related to improper handling of SQL input, categorized under CWE-89 (SQL Injection). Although it does not impact confidentiality or availability directly, it can compromise data integrity by manipulating internal states. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability requires no privileges and no user interaction, making it relatively easy to exploit remotely. Organizations using Virtuoso OpenSource 7. 2.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:20:29 UTC

Technical Analysis

CVE-2024-57645 is a vulnerability identified in the qi_inst_state_free component of OpenLink Virtuoso OpenSource version 7.2.11, a widely used multi-model database engine supporting SQL and RDF data. The flaw arises from improper handling of crafted SQL statements, enabling attackers to trigger a denial of service condition. This vulnerability is classified under CWE-89, indicating it is related to SQL Injection, where malicious SQL input can alter the intended execution flow. Specifically, the vulnerability allows attackers to manipulate the internal state freeing mechanism (qi_inst_state_free), causing the database process to crash or become unresponsive, resulting in denial of service. The attack vector is network-based (AV:N), requiring no authentication (PR:N) or user interaction (UI:N), making it highly accessible to remote attackers. The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component without affecting other system components. The CVSS v3.1 score of 7.5 reflects a high severity level due to the ease of exploitation and the impact on data integrity (I:H), although confidentiality and availability are not directly affected. No patches or fixes have been released at the time of publication, and no active exploitation has been reported. This vulnerability poses a significant risk to organizations relying on Virtuoso OpenSource 7.2.11 for critical data services, especially those utilizing complex SQL queries or linked data applications.

Potential Impact

The primary impact of CVE-2024-57645 is denial of service through forced crashes or unresponsiveness of the Virtuoso database server, which can disrupt business operations relying on continuous data availability. While confidentiality and availability are not directly compromised, the integrity of the database is at risk due to the potential manipulation of internal states via crafted SQL inputs. This can lead to corrupted query results or inconsistent data states, undermining trust in the database outputs. Organizations using Virtuoso OpenSource 7.2.11 in production environments, especially those supporting critical applications such as semantic web services, linked data platforms, or enterprise data integration, may experience service outages or degraded performance. The ease of exploitation without authentication increases the likelihood of opportunistic attacks, potentially affecting cloud-hosted or internet-facing database instances. The lack of patches further exacerbates the risk, requiring immediate mitigation efforts to prevent exploitation. The disruption can lead to operational downtime, loss of productivity, and potential financial losses, particularly for organizations dependent on real-time data processing.

Mitigation Recommendations

To mitigate CVE-2024-57645, organizations should first assess their deployment of OpenLink Virtuoso OpenSource version 7.2.11 and identify exposed instances, especially those accessible over public networks. Until an official patch is released, apply the following specific measures: 1) Implement network-level access controls such as firewalls and IP whitelisting to restrict access to the Virtuoso database server only to trusted hosts and internal networks. 2) Employ SQL input validation and query parameterization where possible to reduce the risk of injection attacks, even though this vulnerability exploits internal state handling. 3) Monitor database logs and network traffic for unusual or malformed SQL queries that could indicate exploitation attempts. 4) Consider deploying application-layer firewalls or intrusion prevention systems (IPS) with custom rules to detect and block suspicious SQL payloads targeting the qi_inst_state_free component. 5) If feasible, isolate the Virtuoso server in a segmented network zone to limit the blast radius of a potential attack. 6) Prepare incident response plans to quickly restart or recover the database service in case of a DoS event. 7) Stay updated with vendor advisories and apply patches immediately upon release. 8) Evaluate alternative database solutions if immediate patching is not possible and the risk is unacceptable. These targeted mitigations go beyond generic advice by focusing on network restrictions, monitoring, and proactive detection tailored to the nature of this SQL injection-related DoS vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bdab7ef31ef0b55b6fb

Added to database: 2/25/2026, 9:38:34 PM

Last enriched: 2/26/2026, 2:20:29 AM

Last updated: 2/26/2026, 6:13:16 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats