Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63655: n/a

0
High
VulnerabilityCVE-2025-63655cvecve-2025-63655
Published: Thu Jan 29 2026 (01/29/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A NULL pointer dereference in the mk_http_range_parse function (mk_server/mk_http.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted HTTP request to the server.

AI-Powered Analysis

AILast updated: 01/29/2026, 20:28:25 UTC

Technical Analysis

CVE-2025-63655 is a denial of service vulnerability found in the Monkey HTTP server, specifically within the mk_http_range_parse function located in the mk_server/mk_http.c source file. The vulnerability arises due to a NULL pointer dereference, which occurs when the server processes a crafted HTTP request containing malformed or malicious range headers. When this function attempts to parse the HTTP Range header, it fails to properly validate input, leading to dereferencing a NULL pointer and causing the server process to crash. This results in a denial of service condition, rendering the server unavailable to legitimate users. The vulnerability does not require any authentication or user interaction, making it easier for remote attackers to exploit. Although no specific affected versions are listed, the flaw is tied to a particular commit (f37e984) in the Monkey server codebase, suggesting it affects versions containing this commit. No patches or fixes have been published yet, and no exploits have been observed in the wild. The lack of a CVSS score means the severity must be assessed based on the impact on availability and ease of exploitation. Given the direct crash caused by a crafted HTTP request, the vulnerability poses a significant risk to service continuity for any deployments of Monkey HTTP server.

Potential Impact

The primary impact of CVE-2025-63655 is on the availability of services running the Monkey HTTP server. Successful exploitation results in a server crash, causing denial of service to legitimate users. For European organizations relying on Monkey server for web services, this could lead to downtime, loss of business continuity, and potential reputational damage. Critical infrastructure or public-facing services using Monkey server are particularly vulnerable to disruption. Although no data confidentiality or integrity issues are indicated, the availability impact alone can be significant, especially for high-traffic or mission-critical environments. The ease of exploitation without authentication increases the risk of widespread attacks. Additionally, attackers could leverage this vulnerability as part of a larger attack chain to cause service outages or distract from other malicious activities. The lack of known exploits currently limits immediate risk, but the vulnerability remains a concern until patched.

Mitigation Recommendations

1. Monitor network traffic for unusual or malformed HTTP Range headers that could indicate exploitation attempts. 2. Implement web application firewalls (WAFs) or intrusion prevention systems (IPS) with rules to detect and block suspicious HTTP requests targeting the Range header. 3. Restrict external access to Monkey HTTP servers where possible, limiting exposure to untrusted networks. 4. Maintain up-to-date backups and ensure rapid recovery procedures are in place to minimize downtime in case of a DoS event. 5. Engage with Monkey server developers or community to track the release of patches or updates addressing this vulnerability and apply them promptly once available. 6. Consider deploying rate limiting or connection throttling to reduce the impact of potential DoS attempts. 7. Conduct internal audits to identify all instances of Monkey HTTP server deployments and assess their exposure. 8. Use network segmentation to isolate vulnerable servers from critical infrastructure to contain potential disruptions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697bbf40ac06320222b3ea50

Added to database: 1/29/2026, 8:12:48 PM

Last enriched: 1/29/2026, 8:28:25 PM

Last updated: 2/5/2026, 4:10:49 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats