CVE-2020-14326Uncontrolled Resource Consumption in Redhat Resteasy

Severity
7.5HIGHNVD
EPSS
0.5%
top 34.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 2
Latest updateMar 18

Description

A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an attacker to cause a denial of service.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDredhat/resteasy4.2.04.5.6
CVEListV5redhat/resteasyRESTEasy 4.5.6.Final

🔴Vulnerability Details

4
OSV
RESTEasy 4.5.5.Final in hash flooding2022-03-18
GHSA
RESTEasy 4.5.5.Final in hash flooding2022-03-18
CVEList
CVE-2020-14326: A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes2021-06-02
OSV
CVE-2020-14326: A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes2021-06-02

📋Vendor Advisories

2
Red Hat
RESTEasy: Caching routes in RootNode may result in DoS2020-07-09
Debian
CVE-2020-14326: resteasy - A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes....2020

💬Community

1
Bugzilla
CVE-2020-14326 RESTEasy: Caching routes in RootNode may result in DoS2020-07-10