CVE-2025-35435: CWE-369 Divide By Zero in CISA Thorium
CISA Thorium accepts a stream split size of zero then divides by this value. A remote, authenticated attacker could cause the service to crash. Fixed in commit 89101a6.
AI Analysis
Technical Summary
CVE-2025-35435 is a medium severity vulnerability identified in CISA Thorium version 1.0.0, categorized under CWE-369 (Divide By Zero). The flaw arises because the Thorium service accepts a stream split size parameter that can be set to zero. When this occurs, the software attempts to divide by this zero value, leading to a runtime exception that causes the service to crash. This vulnerability requires an attacker to be authenticated to the system but does not require any user interaction. The attack vector is network-based (AV:N), and the attack complexity is low (AC:L), meaning an authenticated attacker with network access can reliably trigger the crash. The impact is limited to availability, as the vulnerability does not affect confidentiality or integrity. No known exploits are currently reported in the wild, and the issue has been fixed in a later commit (89101a6). The vulnerability does not allow privilege escalation or data compromise but can cause denial of service by crashing the Thorium service, potentially disrupting operations relying on it.
Potential Impact
For European organizations using CISA Thorium 1.0.0, this vulnerability poses a risk of service disruption due to denial of service attacks by authenticated users. While the impact is limited to availability and does not compromise data confidentiality or integrity, the crash of Thorium services could interrupt critical cybersecurity monitoring or response functions if Thorium is integrated into security operations. Organizations relying heavily on Thorium for threat detection or incident response may experience operational delays or gaps in security coverage during service downtime. The requirement for authentication limits the attack surface to insiders or compromised accounts, but insider threats or credential theft could still enable exploitation. Given the medium severity and the availability of a fix, timely patching is essential to maintain service reliability and avoid potential operational disruptions.
Mitigation Recommendations
1. Apply the patch or update to the fixed version of CISA Thorium that includes commit 89101a6 to eliminate the divide-by-zero flaw. 2. Restrict and monitor authenticated access to the Thorium service, enforcing strong authentication mechanisms and least privilege principles to reduce the risk of malicious insiders or compromised accounts exploiting the vulnerability. 3. Implement robust logging and alerting on abnormal service crashes or restarts to detect potential exploitation attempts promptly. 4. Conduct regular security audits and vulnerability scans on Thorium deployments to ensure no outdated versions remain in production. 5. Consider deploying application-layer protections such as input validation or filtering to prevent zero values from being accepted as stream split sizes if patching is delayed. 6. Establish incident response procedures to quickly recover from service disruptions caused by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-35435: CWE-369 Divide By Zero in CISA Thorium
Description
CISA Thorium accepts a stream split size of zero then divides by this value. A remote, authenticated attacker could cause the service to crash. Fixed in commit 89101a6.
AI-Powered Analysis
Technical Analysis
CVE-2025-35435 is a medium severity vulnerability identified in CISA Thorium version 1.0.0, categorized under CWE-369 (Divide By Zero). The flaw arises because the Thorium service accepts a stream split size parameter that can be set to zero. When this occurs, the software attempts to divide by this zero value, leading to a runtime exception that causes the service to crash. This vulnerability requires an attacker to be authenticated to the system but does not require any user interaction. The attack vector is network-based (AV:N), and the attack complexity is low (AC:L), meaning an authenticated attacker with network access can reliably trigger the crash. The impact is limited to availability, as the vulnerability does not affect confidentiality or integrity. No known exploits are currently reported in the wild, and the issue has been fixed in a later commit (89101a6). The vulnerability does not allow privilege escalation or data compromise but can cause denial of service by crashing the Thorium service, potentially disrupting operations relying on it.
Potential Impact
For European organizations using CISA Thorium 1.0.0, this vulnerability poses a risk of service disruption due to denial of service attacks by authenticated users. While the impact is limited to availability and does not compromise data confidentiality or integrity, the crash of Thorium services could interrupt critical cybersecurity monitoring or response functions if Thorium is integrated into security operations. Organizations relying heavily on Thorium for threat detection or incident response may experience operational delays or gaps in security coverage during service downtime. The requirement for authentication limits the attack surface to insiders or compromised accounts, but insider threats or credential theft could still enable exploitation. Given the medium severity and the availability of a fix, timely patching is essential to maintain service reliability and avoid potential operational disruptions.
Mitigation Recommendations
1. Apply the patch or update to the fixed version of CISA Thorium that includes commit 89101a6 to eliminate the divide-by-zero flaw. 2. Restrict and monitor authenticated access to the Thorium service, enforcing strong authentication mechanisms and least privilege principles to reduce the risk of malicious insiders or compromised accounts exploiting the vulnerability. 3. Implement robust logging and alerting on abnormal service crashes or restarts to detect potential exploitation attempts promptly. 4. Conduct regular security audits and vulnerability scans on Thorium deployments to ensure no outdated versions remain in production. 5. Consider deploying application-layer protections such as input validation or filtering to prevent zero values from being accepted as stream split sizes if patching is delayed. 6. Establish incident response procedures to quickly recover from service disruptions caused by this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-04-15T20:57:14.281Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68cae909b253b63d00f0f6e0
Added to database: 9/17/2025, 4:59:53 PM
Last enriched: 10/1/2025, 12:17:01 AM
Last updated: 11/1/2025, 2:13:37 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11922: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in j_3rk Inactive Logout
MediumCVE-2025-11920: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in whyun WPCOM Member
HighCVE-2025-11816: CWE-862 Missing Authorization in wplegalpages Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages
MediumCVE-2025-11174: CWE-285 Improper Authorization in barn2media Document Library Lite
MediumThe AI Trust Paradox: Why Security Teams Fear Automated Remediation
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.