CVE-2023-40711
📋 TL;DR
This vulnerability in Veilid allows remote attackers to send specially crafted packets that cause excessive memory consumption during decompression, leading to denial of service through application crashes. Any system running vulnerable Veilid versions is affected, particularly those exposed to untrusted networks.
💻 Affected Systems
- Veilid
📦 What is this software?
Veilid by Veilid
⚠️ Risk & Real-World Impact
Worst Case
Complete service disruption through repeated crashes, potentially leading to extended downtime and resource exhaustion on the host system.
Likely Case
Intermittent service interruptions and instability as attackers trigger memory exhaustion crashes.
If Mitigated
Minimal impact with proper network segmentation and updated software.
🎯 Exploit Status
Actively exploited in the wild since August 2023. Attack requires sending crafted packets to vulnerable Veilid instances.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.1.9 and later
Vendor Advisory: https://gitlab.com/veilid/veilid/-/blob/main/CHANGELOG.md
Restart Required: Yes
Instructions:
1. Stop Veilid service. 2. Update to version 0.1.9 or later using your package manager or from source. 3. Restart Veilid service.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to Veilid services to trusted sources only
Rate Limiting
allImplement network rate limiting to reduce impact of DoS attempts
🧯 If You Can't Patch
- Implement strict network access controls to limit exposure
- Monitor system memory usage and restart services if abnormal consumption detected
🔍 How to Verify
Check if Vulnerable:
Check Veilid version - if version is less than 0.1.9, system is vulnerable
Check Version:
veilid --version or check package manager for installed version
Verify Fix Applied:
Confirm Veilid version is 0.1.9 or higher after update
📡 Detection & Monitoring
Log Indicators:
- Application crashes with out-of-memory errors
- Abnormal termination of Veilid processes
- High memory consumption spikes
Network Indicators:
- Unusual packet patterns to Veilid ports
- High volume of small packets triggering decompression
SIEM Query:
source="veilid" AND ("out of memory" OR "abort" OR "crash")