Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Apache bRPC Framework Vulnerability Let Attackers Crash the Server

Posted on December 1, 2025December 1, 2025 By CWS

A crucial safety vulnerability has been found within the Apache bRPC framework that would enable distant attackers to crash servers by sending specifically crafted JSON information.

The flaw, tracked as CVE-2025-59789, impacts all variations of Apache bRPC earlier than 1.15.0 throughout all platforms.

The vulnerability exists within the json2pb element of Apache bRPC, which converts JSON information to Protocol Buffer messages.

The element depends on rapidjson for parsing JSON information obtained from the community. By default, the rapidjson parser makes use of a recursive parsing methodology.

When attackers ship JSON information with deeply nested recursive constructions, the parser operate exhausts the stack reminiscence, leading to a stack overflow.

FieldDetailsCVE IDCVE-2025-59789CVSS Score9.8 (Essential)Assault VectorNetworkAffected VersionsApache bRPC < 1.15.0Vulnerability TypeUncontrolled Recursion / Stack Overflow

This causes the server to crash, resulting in a denial-of-service situation. Organizations utilizing bRPC servers are in danger in the event that they meet any of the next situations.

Working a bRPC server with protobuf messages that handles HTTP+JSON requests from untrusted networks.

Utilizing the JsonToProtoMessage operate to transform JSON from untrusted enter sources, Apache has supplied two choices to deal with this safety concern:

Improve to Apache bRPC model 1.15.0, which incorporates the entire repair for this vulnerability. Apply the official patch accessible on GitHub for these unable to improve instantly.

Each fixes introduce a brand new recursion depth restrict with a default worth of 100. This variation impacts 4 key capabilities: ProtoMessageToJson, ProtoMessageToProtoJson, JsonToProtoMessage, and ProtoJsonToProtoMessage.

Organizations ought to notice that requests containing JSON or protobuf messages exceeding this depth restrict will fail after the repair is utilized.

Directors can modify the restrict by modifying the json2pb_max_recursion_depth gflag on meet their particular necessities.

Safety groups are strongly suggested to evaluate their environments and apply the mandatory patches instantly to forestall potential denial-of-service assaults.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Apache, Attackers, bRPC, Crash, Critical, Framework, Server, Vulnerability

Post navigation

Previous Post: Australian Man Sentenced to Prison for Wi-Fi Attacks at Airports and on Flights
Next Post: Kevin Lancaster Joins the usecure Board to Accelerate North American Channel Growth

Related Posts

New Malware Using Azure Functions For Hosting Command And Control Infrastructure Cyber Security News
Chinese Front Companies Providing Advanced Steganography Solutions for APT Operations Cyber Security News
5,000+ Fake Online Pharmacies Websites Selling Counterfeit Medicines Cyber Security News
Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs Cyber Security News
Cybersecurity Professionals Charged for Deploying ALPHV BlackCat Ransomware Against US Companies Cyber Security News
CrowdStrike Falcon Windows Sensor Vulnerability Let Attackers Execute Code and Delete Files on Host Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark