CVE-2025-58369: CWE-400: Uncontrolled Resource Consumption in typelevel fs2
fs2 is a compositional, streaming I/O library for Scala. Versions 3.12.2 and lower and 3.13.0-M1 through 3.13.0-M6 is vulnerable to denial of service attacks though TLS sessions using fs2-io on the JVM using the fs2.io.net.tls package. When establishing a TLS session, if one side of the connection shuts down `write` while the peer side is awaiting more data to progress the TLS handshake, the peer side will spin loop on the socket read, fully utilizing a CPU. The CPU is consumed until the overall connection is closed, potentially shutting down a fs2-io powered server. This issue is fixed in versions 3.12.1 and 3.13.0-M7.
AI Analysis
Technical Summary
CVE-2025-58369 is a medium severity vulnerability affecting the typelevel fs2 library, a compositional streaming I/O library for Scala, specifically versions prior to 3.12.2 and between 3.13.0-M1 and 3.13.0-M6. The vulnerability arises in the TLS session establishment process when using the fs2-io module on the JVM, particularly within the fs2.io.net.tls package. During a TLS handshake, if one side of the connection shuts down its write stream while the peer side is still awaiting data to progress the handshake, the peer side enters a spin loop on the socket read operation. This results in uncontrolled CPU consumption, effectively a denial of service (DoS) condition, as the CPU remains fully utilized until the connection is closed. This can lead to resource exhaustion on servers that rely on fs2-io for TLS connections, potentially causing service degradation or outages. The root cause is an uncontrolled resource consumption issue classified under CWE-400. The vulnerability does not impact confidentiality or integrity but affects availability by exhausting CPU resources. The issue has been addressed in fs2 versions 3.12.1 and 3.13.0-M7 and later. No known exploits are reported in the wild as of the publication date, and the CVSS v3.1 base score is 5.3, reflecting a medium severity level due to network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to availability.
Potential Impact
For European organizations, the impact of CVE-2025-58369 primarily concerns availability disruptions in services that utilize the fs2 library for streaming I/O over TLS on JVM platforms. Organizations running Scala-based applications or microservices that depend on fs2-io for secure communications may experience high CPU utilization leading to denial of service conditions, potentially causing application downtime or degraded performance. This can affect financial institutions, government services, and enterprises relying on real-time data streaming or secure communications. The vulnerability could be exploited remotely without authentication or user interaction, increasing the risk of automated or large-scale DoS attacks. While the vulnerability does not compromise data confidentiality or integrity, the availability impact could disrupt critical business operations, especially in sectors with stringent uptime requirements. European organizations with limited monitoring of JVM-based TLS connections or those slow to update dependencies may be particularly vulnerable to service interruptions.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately upgrade the fs2 library to version 3.12.1 or later, or 3.13.0-M7 or later, as these versions contain the fix for the TLS handshake spin loop issue. 2) Audit all Scala-based applications and services to identify usage of vulnerable fs2 versions, including transitive dependencies in build configurations (e.g., sbt, Maven). 3) Implement runtime monitoring of CPU utilization and network socket states on JVM hosts to detect abnormal resource consumption patterns indicative of this vulnerability being triggered. 4) Employ network-level rate limiting or connection throttling on TLS endpoints to reduce the risk of sustained DoS attempts exploiting this issue. 5) Consider deploying JVM-level TLS handshake timeouts or socket read timeouts as a temporary workaround to prevent indefinite spin loops. 6) Engage in regular dependency management and security scanning to promptly identify and remediate vulnerable library versions. 7) Coordinate with development teams to incorporate secure coding practices and TLS session management improvements to avoid similar resource exhaustion issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2025-58369: CWE-400: Uncontrolled Resource Consumption in typelevel fs2
Description
fs2 is a compositional, streaming I/O library for Scala. Versions 3.12.2 and lower and 3.13.0-M1 through 3.13.0-M6 is vulnerable to denial of service attacks though TLS sessions using fs2-io on the JVM using the fs2.io.net.tls package. When establishing a TLS session, if one side of the connection shuts down `write` while the peer side is awaiting more data to progress the TLS handshake, the peer side will spin loop on the socket read, fully utilizing a CPU. The CPU is consumed until the overall connection is closed, potentially shutting down a fs2-io powered server. This issue is fixed in versions 3.12.1 and 3.13.0-M7.
AI-Powered Analysis
Technical Analysis
CVE-2025-58369 is a medium severity vulnerability affecting the typelevel fs2 library, a compositional streaming I/O library for Scala, specifically versions prior to 3.12.2 and between 3.13.0-M1 and 3.13.0-M6. The vulnerability arises in the TLS session establishment process when using the fs2-io module on the JVM, particularly within the fs2.io.net.tls package. During a TLS handshake, if one side of the connection shuts down its write stream while the peer side is still awaiting data to progress the handshake, the peer side enters a spin loop on the socket read operation. This results in uncontrolled CPU consumption, effectively a denial of service (DoS) condition, as the CPU remains fully utilized until the connection is closed. This can lead to resource exhaustion on servers that rely on fs2-io for TLS connections, potentially causing service degradation or outages. The root cause is an uncontrolled resource consumption issue classified under CWE-400. The vulnerability does not impact confidentiality or integrity but affects availability by exhausting CPU resources. The issue has been addressed in fs2 versions 3.12.1 and 3.13.0-M7 and later. No known exploits are reported in the wild as of the publication date, and the CVSS v3.1 base score is 5.3, reflecting a medium severity level due to network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to availability.
Potential Impact
For European organizations, the impact of CVE-2025-58369 primarily concerns availability disruptions in services that utilize the fs2 library for streaming I/O over TLS on JVM platforms. Organizations running Scala-based applications or microservices that depend on fs2-io for secure communications may experience high CPU utilization leading to denial of service conditions, potentially causing application downtime or degraded performance. This can affect financial institutions, government services, and enterprises relying on real-time data streaming or secure communications. The vulnerability could be exploited remotely without authentication or user interaction, increasing the risk of automated or large-scale DoS attacks. While the vulnerability does not compromise data confidentiality or integrity, the availability impact could disrupt critical business operations, especially in sectors with stringent uptime requirements. European organizations with limited monitoring of JVM-based TLS connections or those slow to update dependencies may be particularly vulnerable to service interruptions.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately upgrade the fs2 library to version 3.12.1 or later, or 3.13.0-M7 or later, as these versions contain the fix for the TLS handshake spin loop issue. 2) Audit all Scala-based applications and services to identify usage of vulnerable fs2 versions, including transitive dependencies in build configurations (e.g., sbt, Maven). 3) Implement runtime monitoring of CPU utilization and network socket states on JVM hosts to detect abnormal resource consumption patterns indicative of this vulnerability being triggered. 4) Employ network-level rate limiting or connection throttling on TLS endpoints to reduce the risk of sustained DoS attempts exploiting this issue. 5) Consider deploying JVM-level TLS handshake timeouts or socket read timeouts as a temporary workaround to prevent indefinite spin loops. 6) Engage in regular dependency management and security scanning to promptly identify and remediate vulnerable library versions. 7) Coordinate with development teams to incorporate secure coding practices and TLS session management improvements to avoid similar resource exhaustion issues.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-29T16:19:59.012Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bb6059535f4a9773160d1a
Added to database: 9/5/2025, 10:12:41 PM
Last enriched: 9/12/2025, 11:54:26 PM
Last updated: 10/23/2025, 1:48:36 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Too Many Secrets: Attackers Pounce on Sensitive Data Sprawl
MediumIt Takes Only 250 Documents to Poison Any AI Model
MediumFake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys
MediumCVE-2025-11575: CWE-276 Incorrect Default Permissions in MongoDB Atlas SQL ODBC driver
HighCVE-2025-62710: CWE-337: Predictable Seed in Pseudo-Random Number Generator (PRNG) in sakaiproject sakai
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.