Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Apache bRPC Framework Vulnerability Let Attackers Crash the Server

Posted on December 1, 2025December 1, 2025 By CWS

A crucial safety vulnerability has been found within the Apache bRPC framework that would enable distant attackers to crash servers by sending specifically crafted JSON information.

The flaw, tracked as CVE-2025-59789, impacts all variations of Apache bRPC earlier than 1.15.0 throughout all platforms.

The vulnerability exists within the json2pb element of Apache bRPC, which converts JSON information to Protocol Buffer messages.

The element depends on rapidjson for parsing JSON information obtained from the community. By default, the rapidjson parser makes use of a recursive parsing methodology.

When attackers ship JSON information with deeply nested recursive constructions, the parser operate exhausts the stack reminiscence, leading to a stack overflow.

FieldDetailsCVE IDCVE-2025-59789CVSS Score9.8 (Essential)Assault VectorNetworkAffected VersionsApache bRPC < 1.15.0Vulnerability TypeUncontrolled Recursion / Stack Overflow

This causes the server to crash, resulting in a denial-of-service situation. Organizations utilizing bRPC servers are in danger in the event that they meet any of the next situations.

Working a bRPC server with protobuf messages that handles HTTP+JSON requests from untrusted networks.

Utilizing the JsonToProtoMessage operate to transform JSON from untrusted enter sources, Apache has supplied two choices to deal with this safety concern:

Improve to Apache bRPC model 1.15.0, which incorporates the entire repair for this vulnerability. Apply the official patch accessible on GitHub for these unable to improve instantly.

Each fixes introduce a brand new recursion depth restrict with a default worth of 100. This variation impacts 4 key capabilities: ProtoMessageToJson, ProtoMessageToProtoJson, JsonToProtoMessage, and ProtoJsonToProtoMessage.

Organizations ought to notice that requests containing JSON or protobuf messages exceeding this depth restrict will fail after the repair is utilized.

Directors can modify the restrict by modifying the json2pb_max_recursion_depth gflag on meet their particular necessities.

Safety groups are strongly suggested to evaluate their environments and apply the mandatory patches instantly to forestall potential denial-of-service assaults.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Apache, Attackers, bRPC, Crash, Critical, Framework, Server, Vulnerability

Post navigation

Previous Post: Australian Man Sentenced to Prison for Wi-Fi Attacks at Airports and on Flights
Next Post: Kevin Lancaster Joins the usecure Board to Accelerate North American Channel Growth

Related Posts

AI Coding Assistant Creating a Perfect Blueprints for Attackers Cyber Security News
New Spear-Phishing Attack Targeting Financial Executives by Deploying NetBird Malware Cyber Security News
FileFix Attack Exploits Windows Browser Features to Bypass Mark-of-the-Web Protection Cyber Security News
Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China Cyber Security News
Developing Collaborative Threat Intelligence Sharing Frameworks Cyber Security News
Network Intrusion Detection for Emerging 2025 Cyber Threats Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark