Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35435: CWE-369 Divide By Zero in CISA Thorium

0
Medium
VulnerabilityCVE-2025-35435cvecve-2025-35435cwe-369
Published: Wed Sep 17 2025 (09/17/2025, 16:53:22 UTC)
Source: CVE Database V5
Vendor/Project: CISA
Product: Thorium

Description

CISA Thorium accepts a stream split size of zero then divides by this value. A remote, authenticated attacker could cause the service to crash. Fixed in commit 89101a6.

AI-Powered Analysis

AILast updated: 10/01/2025, 00:17:01 UTC

Technical Analysis

CVE-2025-35435 is a medium severity vulnerability identified in CISA Thorium version 1.0.0, categorized under CWE-369 (Divide By Zero). The flaw arises because the Thorium service accepts a stream split size parameter that can be set to zero. When this occurs, the software attempts to divide by this zero value, leading to a runtime exception that causes the service to crash. This vulnerability requires an attacker to be authenticated to the system but does not require any user interaction. The attack vector is network-based (AV:N), and the attack complexity is low (AC:L), meaning an authenticated attacker with network access can reliably trigger the crash. The impact is limited to availability, as the vulnerability does not affect confidentiality or integrity. No known exploits are currently reported in the wild, and the issue has been fixed in a later commit (89101a6). The vulnerability does not allow privilege escalation or data compromise but can cause denial of service by crashing the Thorium service, potentially disrupting operations relying on it.

Potential Impact

For European organizations using CISA Thorium 1.0.0, this vulnerability poses a risk of service disruption due to denial of service attacks by authenticated users. While the impact is limited to availability and does not compromise data confidentiality or integrity, the crash of Thorium services could interrupt critical cybersecurity monitoring or response functions if Thorium is integrated into security operations. Organizations relying heavily on Thorium for threat detection or incident response may experience operational delays or gaps in security coverage during service downtime. The requirement for authentication limits the attack surface to insiders or compromised accounts, but insider threats or credential theft could still enable exploitation. Given the medium severity and the availability of a fix, timely patching is essential to maintain service reliability and avoid potential operational disruptions.

Mitigation Recommendations

1. Apply the patch or update to the fixed version of CISA Thorium that includes commit 89101a6 to eliminate the divide-by-zero flaw. 2. Restrict and monitor authenticated access to the Thorium service, enforcing strong authentication mechanisms and least privilege principles to reduce the risk of malicious insiders or compromised accounts exploiting the vulnerability. 3. Implement robust logging and alerting on abnormal service crashes or restarts to detect potential exploitation attempts promptly. 4. Conduct regular security audits and vulnerability scans on Thorium deployments to ensure no outdated versions remain in production. 5. Consider deploying application-layer protections such as input validation or filtering to prevent zero values from being accepted as stream split sizes if patching is delayed. 6. Establish incident response procedures to quickly recover from service disruptions caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:57:14.281Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cae909b253b63d00f0f6e0

Added to database: 9/17/2025, 4:59:53 PM

Last enriched: 10/1/2025, 12:17:01 AM

Last updated: 11/1/2025, 2:13:37 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats