Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Apache bRPC Vulnerability Allows Attackers to Crash the Service via Network

Apache bRPC Vulnerability Allows Attackers to Crash the Service via Network

Posted on August 12, 2025August 12, 2025 By CWS

A extreme vulnerability in Apache bRPC has been found that enables attackers to crash providers via community exploitation, affecting all variations previous to 1.14.1. 

The vulnerability, recognized as CVE-2025-54472 with “necessary” severity classification, stems from limitless reminiscence allocation within the Redis protocol parser part.

Key Takeaways1. Apache bRPC variations earlier than 1.14.1 have a Redis parser vulnerability.2.  Attackers ship crafted packets with giant integers to set off reminiscence allocation failures.3. Improve or apply GitHub patch.

Apache bRPC Vulnerability

The basis reason behind this vulnerability lies within the bRPC Redis protocol parser’s dealing with of community knowledge. 

When processing Redis protocol messages, the parser allocates reminiscence for arrays or strings based mostly on integer values learn straight from community packets with out correct validation. 

Malicious actors can exploit this by transmitting specifically crafted knowledge packets containing excessively giant integer values, triggering a bad_alloc error that causes speedy service termination.

The vulnerability impacts important utilization situations, together with bRPC deployments functioning as Redis servers serving untrusted purchasers, and bRPC situations appearing as Redis purchasers connecting to probably compromised Redis providers. 

The assault vector requires solely community entry to the goal service, making it notably harmful for internet-facing deployments.

Notably, Apache bRPC model 1.14.0 tried to handle this subject by implementing reminiscence allocation dimension limitations. 

Nevertheless, the repair contained a important implementation flaw that allowed integer overflow situations to bypass the safety controls, leaving model 1.14.0 susceptible to exploitation via completely different integer ranges.

Tyler Zars receives credit score for locating and reporting this vulnerability.

Threat FactorsDetailsAffected ProductsApache bRPC all variations ImpactDenial of ServiceExploit Conditions– Community entry to focus on bRPC service- Service configured as Redis server with untrusted purchasers OR- Service configured as Redis consumer connecting to untrusted Redis serversSeverityImportant

Mitigations

Organizations can remediate this vulnerability via two main approaches. The beneficial resolution entails upgrading to Apache bRPC model 1.14.1, which implements correct bounds checking for reminiscence allocation requests. 

Alternatively, directors can manually apply the accessible safety patch.

The carried out repair introduces a default most allocation restrict of 64MB per Redis parser operation, managed by the redis_max_allocation_size gflag parameter. 

Organizations processing Redis requests or responses exceeding 64MB ought to alter this parameter accordingly to stop reliable operations from failing post-upgrade.

The Apache bRPC challenge has launched complete documentation and patches via their official channels, emphasizing the important nature of this safety replace for manufacturing environments dealing with untrusted community site visitors.

Equip your SOC with full entry to the most recent risk knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Apache, Attackers, bRPC, Crash, Network, Service, Vulnerability

Post navigation

Previous Post: Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors
Next Post: OT Networks Targeted in Widespread Exploitation of Erlang/OTP Vulnerability

Related Posts

AppSuite PDF Editor Hacked to Execute Arbitrary Commands on The Infected System AppSuite PDF Editor Hacked to Execute Arbitrary Commands on The Infected System Cyber Security News
TA829 Hackers Employs New TTPs and Upgraded RomCom Backdoor to Evade Detections TA829 Hackers Employs New TTPs and Upgraded RomCom Backdoor to Evade Detections Cyber Security News
New LockBit 5.0 Ransomware Variant Attacking Windows, Linux, and ESXi Systems New LockBit 5.0 Ransomware Variant Attacking Windows, Linux, and ESXi Systems Cyber Security News
Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams Cyber Security News
Beware of Security Alert-Themed Malicious Emails that Steal Your Email Logins Beware of Security Alert-Themed Malicious Emails that Steal Your Email Logins Cyber Security News
ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News