Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5949: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Deep Sea Electronics DSE855

0
Medium
VulnerabilityCVE-2024-5949cvecve-2024-5949cwe-835
Published: Thu Jun 13 2024 (06/13/2024, 19:40:32 UTC)
Source: CVE Database V5
Vendor/Project: Deep Sea Electronics
Product: DSE855

Description

Deep Sea Electronics DSE855 Multipart Boundary Infinite Loop Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of multipart boundaries. The issue results from a logic error that can lead to an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-23171.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 02:58:31 UTC

Technical Analysis

CVE-2024-5949 is a vulnerability identified in Deep Sea Electronics DSE855 devices, specifically version 1.1.0. The root cause is a logic error in the device's handling of multipart boundaries, which leads to an infinite loop condition (classified under CWE-835: Loop with Unreachable Exit Condition). This infinite loop can be triggered by a network-adjacent attacker without requiring authentication or user interaction, making the attack vector relatively accessible within the network environment. When exploited, the infinite loop causes the device to enter a denial-of-service (DoS) state by consuming processing resources indefinitely, thereby disrupting normal device operation. The vulnerability was assigned a CVSS v3.0 base score of 4.3, reflecting a medium severity level primarily due to its impact on availability and the lack of impact on confidentiality or integrity. The vulnerability was reported through the Zero Day Initiative (ZDI) as ZDI-CAN-23171 and published on June 13, 2024. Currently, there are no known public exploits or patches available, which increases the urgency for defensive measures. The DSE855 is commonly used in industrial and energy management applications, where device availability is critical. The infinite loop arises from improper multipart boundary parsing logic, which fails to exit under certain crafted input conditions, causing the device to hang or become unresponsive.

Potential Impact

The primary impact of CVE-2024-5949 is denial of service, which can disrupt the availability of Deep Sea Electronics DSE855 devices. These devices are often deployed in industrial control systems, power generation, and energy management environments where continuous operation is essential. A successful attack could cause operational downtime, potentially leading to loss of monitoring or control capabilities, delayed response to critical events, and increased risk of cascading failures in dependent systems. Although the vulnerability does not compromise confidentiality or integrity, the loss of availability can have significant operational and safety implications, especially in critical infrastructure sectors. The ease of exploitation without authentication and user interaction increases the risk, particularly in environments with insufficient network segmentation or monitoring. Organizations relying on these devices may experience service interruptions, increased maintenance costs, and potential regulatory compliance issues if availability is compromised.

Mitigation Recommendations

Given the absence of an official patch, organizations should implement immediate network-level mitigations. These include isolating DSE855 devices within segmented and controlled network zones to limit exposure to untrusted or less secure network segments. Deploy intrusion detection or prevention systems (IDS/IPS) with custom rules to detect and block malformed multipart boundary traffic that could trigger the infinite loop. Regularly monitor device logs and network traffic for anomalies indicative of attempted exploitation. Restrict network access to the devices to only trusted management systems and personnel. Engage with Deep Sea Electronics for updates and apply patches promptly once available. Additionally, consider implementing redundant systems or failover mechanisms to maintain operational continuity in case of device failure. Conduct security assessments and penetration testing focused on multipart boundary handling to identify potential attack vectors within the network environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-06-13T02:02:14.908Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6bf8b7ef31ef0b55d277

Added to database: 2/25/2026, 9:39:04 PM

Last enriched: 2/26/2026, 2:58:31 AM

Last updated: 4/12/2026, 7:44:24 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses