Vulnerability Name: | CVE-2020-14326 (CCN-202933) | ||||||||||||
Assigned: | 2020-06-17 | ||||||||||||
Published: | 2021-05-27 | ||||||||||||
Updated: | 2022-07-15 | ||||||||||||
Summary: | A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an attacker to cause a denial of service. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-14326 Source: CCN Type: Red Hat Bugzilla Bug 1855826 (CVE-2020-14326) - CVE-2020-14326 RESTEasy: Caching routes in RootNode may result in DoS Source: MISC Type: Issue Tracking, Vendor Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1855826 Source: XF Type: UNKNOWN resteasy-cve202014326-dos(202933) Source: CCN Type: RESTEasy Web site RESTEasy Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20210713-0001/ | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||
BACK |