vulnerability
Red Hat JBoss EAP: CVE-2023-51775: Uncontrolled Resource Consumption
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Feb 29, 2024 | Sep 19, 2024 | Jul 9, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Feb 29, 2024
Added
Sep 19, 2024
Modified
Jul 9, 2025
Description
The jose4j component before 0.9.4 for Java allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.. A flaw was found in the jose.4.j (jose4j) library. The JWE key management algorithms based on PBKDF2 require a JOSE Header Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2 iterations needed to derive a CEK wrapping key. Its primary purpose is to intentionally slow down the key derivation function, making password brute-force and dictionary attacks more resource-intensive. However, if an attacker sets the p2c parameter in JWE to a large number, it can cause high computational consumption, resulting in a denial of service.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CWE-400
- CVE-2023-51775
- https://attackerkb.com/topics/CVE-2023-51775
- URL-https://access.redhat.com/security/cve/CVE-2023-51775
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2266921
- URL-https://access.redhat.com/errata/RHSA-2024:4392
- URL-https://access.redhat.com/errata/RHSA-2024:8075
- URL-https://access.redhat.com/errata/RHSA-2024:8076
- URL-https://access.redhat.com/errata/RHSA-2024:8077
- URL-https://access.redhat.com/errata/RHSA-2024:8080
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.