Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24802: CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop') in briandilley jsonrpc4j

0
Medium
VulnerabilityCVE-2026-24802cvecve-2026-24802cwe-835
Published: Tue Jan 27 2026 (01/27/2026, 08:38:34 UTC)
Source: CVE Database V5
Vendor/Project: briandilley
Product: jsonrpc4j

Description

Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in briandilley jsonrpc4j (src/main/java/com/googlecode/jsonrpc4j modules). This vulnerability is associated with program files NoCloseOutputStream.Java. This issue affects jsonrpc4j: through 1.6.0.

AI-Powered Analysis

AILast updated: 01/27/2026, 09:06:47 UTC

Technical Analysis

CVE-2026-24802 identifies a loop with an unreachable exit condition (CWE-835) in the jsonrpc4j library, specifically within the NoCloseOutputStream.java source file. Jsonrpc4j is a Java library used to facilitate JSON-RPC communication, commonly integrated into Java applications for remote procedure calls. The vulnerability exists in versions up to 1.6.0 and manifests as an infinite loop that can be triggered remotely without requiring authentication, though user interaction is necessary. This infinite loop can cause the affected application to hang or consume excessive CPU resources, leading to denial of service (DoS) conditions. The CVSS 4.0 base score of 5.3 reflects a medium severity, considering the network attack vector, low attack complexity, no privileges required, but user interaction needed, and limited impact on confidentiality, integrity, and availability. No public exploits are known at this time, and no official patches have been released yet. The vulnerability’s root cause is a programming logic error where the loop condition never becomes false, causing the program to stall indefinitely. This can degrade service availability and potentially impact dependent systems or users relying on the affected services.

Potential Impact

For European organizations, the primary impact is potential denial of service on applications using the vulnerable jsonrpc4j library. This can result in service outages, degraded performance, and resource exhaustion, affecting business continuity and user experience. Organizations relying on Java-based RPC frameworks in critical infrastructure, financial services, or public sector applications may face operational disruptions. Although the vulnerability does not directly expose sensitive data or allow privilege escalation, the availability impact can indirectly affect confidentiality and integrity by disrupting normal security controls or incident response processes. The medium severity rating suggests moderate risk, but the ease of exploitation without authentication and the widespread use of Java in Europe elevate the concern. Additionally, sectors with high reliance on RPC communications, such as telecommunications and software development firms, could experience increased risk.

Mitigation Recommendations

Immediate mitigation involves auditing all applications and services for usage of jsonrpc4j versions up to 1.6.0. Organizations should monitor vendor channels for official patches or updates addressing CVE-2026-24802. In the absence of an official patch, developers can implement code-level fixes to ensure loop exit conditions are reachable, such as adding timeout mechanisms or loop iteration limits in NoCloseOutputStream.java. Employing runtime monitoring and resource usage alerts can help detect anomalous CPU or memory consumption indicative of exploitation attempts. Network-level protections, such as rate limiting and input validation on JSON-RPC endpoints, can reduce the likelihood of triggering the infinite loop. Additionally, isolating vulnerable services and applying strict access controls can limit exposure. Regular security testing and code reviews focusing on loop constructs and exit conditions in RPC libraries are recommended to prevent similar issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GovTech CSG
Date Reserved
2026-01-27T08:18:43.268Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69787c804623b1157c108bd6

Added to database: 1/27/2026, 8:51:12 AM

Last enriched: 1/27/2026, 9:06:47 AM

Last updated: 2/7/2026, 7:04:06 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats