Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54472: CWE-400 Uncontrolled Resource Consumption in Apache Software Foundation Apache bRPC

0
High
VulnerabilityCVE-2025-54472cvecve-2025-54472cwe-400cwe-190
Published: Thu Aug 14 2025 (08/14/2025, 09:05:38 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache bRPC

Description

Unlimited memory allocation in redis protocol parser in Apache bRPC (all versions < 1.14.1) on all platforms allows attackers to crash the service via network. Root Cause: In the bRPC Redis protocol parser code, memory for arrays or strings of corresponding sizes is allocated based on the integers read from the network. If the integer read from the network is too large, it may cause a bad alloc error and lead to the program crashing. Attackers can exploit this feature by sending special data packets to the bRPC service to carry out a denial-of-service attack on it. The bRPC 1.14.0 version tried to fix this issue by limited the memory allocation size, however, the limitation checking code is not well implemented that may cause integer overflow and evade such limitation. So the 1.14.0 version is also vulnerable, although the integer range that affect version 1.14.0 is different from that affect version < 1.14.0. Affected scenarios: Using bRPC as a Redis server to provide network services to untrusted clients, or using bRPC as a Redis client to call untrusted Redis services. How to Fix: we provide two methods, you can choose one of them: 1. Upgrade bRPC to version 1.14.1. 2. Apply this patch ( https://github.com/apache/brpc/pull/3050 ) manually. No matter you choose which method, you should note that the patch limits the maximum length of memory allocated for each time in the bRPC Redis parser. The default limit is 64M. If some of you redis request or response have a size larger than 64M, you might encounter error after upgrade. For such case, you can modify the gflag redis_max_allocation_size to set a larger limit.

AI-Powered Analysis

AILast updated: 11/04/2025, 22:07:03 UTC

Technical Analysis

CVE-2025-54472 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-190 (Integer Overflow) affecting Apache bRPC, a high-performance RPC framework developed by the Apache Software Foundation. The flaw exists in the Redis protocol parser component of bRPC versions before 1.14.1, where memory allocation for arrays or strings is determined by integers read directly from network packets. If an attacker sends a specially crafted Redis protocol message with an excessively large integer value, the parser attempts to allocate an unbounded amount of memory, which can cause a bad_alloc error or crash the service, resulting in a denial-of-service condition. The initial attempt to fix this in version 1.14.0 introduced a memory allocation limit, but due to improper integer overflow checks, the limitation could be bypassed, leaving that version vulnerable as well. The vulnerability applies both when bRPC is used as a Redis server accepting requests from untrusted clients and when used as a Redis client connecting to untrusted Redis servers. The patch introduced caps the maximum memory allocation per request to 64MB by default, configurable via the redis_max_allocation_size flag to accommodate legitimate large requests. Exploitation requires no authentication or user interaction and can be performed remotely over the network, making it a critical availability risk. No known exploits are reported in the wild yet, but the vulnerability is publicly disclosed and rated with a CVSS 3.1 score of 7.5, indicating high severity.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of services relying on Apache bRPC for Redis protocol communication. A successful exploitation can cause service crashes and denial-of-service, disrupting critical applications such as caching layers, session stores, or distributed data processing that depend on Redis interactions through bRPC. This can lead to operational downtime, degraded user experience, and potential cascading failures in microservices architectures. Organizations in sectors with high reliance on real-time data processing, financial services, telecommunications, and cloud service providers are particularly vulnerable. Additionally, if bRPC is exposed to untrusted networks or external clients without proper network segmentation or filtering, the attack surface increases substantially. The vulnerability does not impact confidentiality or integrity directly but can indirectly affect business continuity and service reliability. Given the ease of remote exploitation without authentication, the threat is elevated for any European entity using affected versions of bRPC in production environments.

Mitigation Recommendations

European organizations should immediately assess their use of Apache bRPC, particularly in Redis-related deployments. The primary mitigation is to upgrade all bRPC instances to version 1.14.1 or later, which contains a robust fix for the uncontrolled memory allocation issue. If upgrading is not immediately feasible, organizations should apply the official patch from the Apache bRPC GitHub repository (PR #3050) to enforce memory allocation limits. It is critical to review and adjust the redis_max_allocation_size configuration flag if legitimate Redis requests or responses exceed the default 64MB limit to avoid service disruptions post-patch. Network-level mitigations include restricting access to bRPC services to trusted clients only, implementing strict firewall rules, and deploying intrusion detection/prevention systems to monitor for anomalous Redis protocol traffic. Additionally, organizations should conduct thorough testing in staging environments to validate the patch and configuration changes before production deployment. Monitoring service logs for memory allocation errors or crashes can help detect attempted exploitation. Finally, maintaining up-to-date software inventories and vulnerability management processes will ensure timely response to similar future threats.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-07-23T09:19:43.081Z
Cvss Version
null
State
PUBLISHED

Threat ID: 689da9bdad5a09ad0059273c

Added to database: 8/14/2025, 9:17:49 AM

Last enriched: 11/4/2025, 10:07:03 PM

Last updated: 11/13/2025, 4:21:42 AM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats