Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Apache bRPC Framework Vulnerability Let Attackers Crash the Server

Critical Apache bRPC Framework Vulnerability Let Attackers Crash the Server

Posted on December 1, 2025December 1, 2025 By CWS

A crucial safety vulnerability has been found within the Apache bRPC framework that would enable distant attackers to crash servers by sending specifically crafted JSON information.

The flaw, tracked as CVE-2025-59789, impacts all variations of Apache bRPC earlier than 1.15.0 throughout all platforms.

The vulnerability exists within the json2pb element of Apache bRPC, which converts JSON information to Protocol Buffer messages.

The element depends on rapidjson for parsing JSON information obtained from the community. By default, the rapidjson parser makes use of a recursive parsing methodology.

When attackers ship JSON information with deeply nested recursive constructions, the parser operate exhausts the stack reminiscence, leading to a stack overflow.

FieldDetailsCVE IDCVE-2025-59789CVSS Score9.8 (Essential)Assault VectorNetworkAffected VersionsApache bRPC < 1.15.0Vulnerability TypeUncontrolled Recursion / Stack Overflow

This causes the server to crash, resulting in a denial-of-service situation. Organizations utilizing bRPC servers are in danger in the event that they meet any of the next situations.

Working a bRPC server with protobuf messages that handles HTTP+JSON requests from untrusted networks.

Utilizing the JsonToProtoMessage operate to transform JSON from untrusted enter sources, Apache has supplied two choices to deal with this safety concern:

Improve to Apache bRPC model 1.15.0, which incorporates the entire repair for this vulnerability. Apply the official patch accessible on GitHub for these unable to improve instantly.

Each fixes introduce a brand new recursion depth restrict with a default worth of 100. This variation impacts 4 key capabilities: ProtoMessageToJson, ProtoMessageToProtoJson, JsonToProtoMessage, and ProtoJsonToProtoMessage.

Organizations ought to notice that requests containing JSON or protobuf messages exceeding this depth restrict will fail after the repair is utilized.

Directors can modify the restrict by modifying the json2pb_max_recursion_depth gflag on meet their particular necessities.

Safety groups are strongly suggested to evaluate their environments and apply the mandatory patches instantly to forestall potential denial-of-service assaults.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Apache, Attackers, bRPC, Crash, Critical, Framework, Server, Vulnerability

Post navigation

Previous Post: Australian Man Sentenced to Prison for Wi-Fi Attacks at Airports and on Flights
Next Post: Kevin Lancaster Joins the usecure Board to Accelerate North American Channel Growth

Related Posts

CPUID Site Delivers Compromised CPU-Z and HWMonitor Tools CPUID Site Delivers Compromised CPU-Z and HWMonitor Tools Cyber Security News
New VanHelsing Ransomware RaaS Model Attacking Windows, Linux, BSD, ARM, and ESXi Systems New VanHelsing Ransomware RaaS Model Attacking Windows, Linux, BSD, ARM, and ESXi Systems Cyber Security News
1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers 1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers Cyber Security News
New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control Cyber Security News
UAT-638 Hackers Exploit Cityworks Zero-Day to Attack IIS Servers With VSHell Malware UAT-638 Hackers Exploit Cityworks Zero-Day to Attack IIS Servers With VSHell Malware Cyber Security News
TP-Link Vulnerability Allows Authentication Bypass Via Password Recovery Feature TP-Link Vulnerability Allows Authentication Bypass Via Password Recovery Feature Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems
  • AI Hallucinations Pose New Security Challenges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems
  • AI Hallucinations Pose New Security Challenges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark