CVE-2024-48075

5.3 MEDIUM

📋 TL;DR

A heap buffer overflow vulnerability in SharkSSL's TLS server-side handshake implementation allows remote attackers to cause denial-of-service by sending malformed Client Key Exchange messages. This affects servers using SharkSSL from Real Time Logic. The vulnerability is triggered during TLS handshake negotiation.

💻 Affected Systems

Products:
  • Real Time Logic SharkSSL
Versions: All versions up to and including 09/09/24
Operating Systems: All platforms where SharkSSL is deployed
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects servers using SharkSSL for TLS connections. Clients are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server crash leading to sustained denial-of-service, potentially requiring manual restart of affected services.

🟠

Likely Case

Service disruption causing temporary unavailability of TLS-protected services until automatic or manual recovery.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring allowing quick detection and response.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malformed TLS packets during handshake. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after commit 7045f6f254060640ff77eef2027f108fcc20e2f2

Vendor Advisory: https://github.com/RealTimeLogic/SharkSSL/commit/7045f6f254060640ff77eef2027f108fcc20e2f2

Restart Required: Yes

Instructions:

1. Update SharkSSL to latest version. 2. Recompile applications using SharkSSL. 3. Restart affected services.

🔧 Temporary Workarounds

Network Filtering

all

Block or filter malformed TLS Client Key Exchange messages at network perimeter

Load Balancer Protection

all

Configure load balancers to detect and drop suspicious TLS handshake patterns

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems
  • Deploy intrusion detection systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check SharkSSL version and build date. Versions built on or before 09/09/24 are vulnerable.

Check Version:

Check application documentation or build information for SharkSSL version

Verify Fix Applied:

Verify SharkSSL version includes commit 7045f6f254060640ff77eef2027f108fcc20e2f2

📡 Detection & Monitoring

Log Indicators:

  • Unexpected server crashes
  • TLS handshake failures
  • Memory allocation errors

Network Indicators:

  • Malformed TLS Client Key Exchange messages
  • Abnormal TLS handshake patterns

SIEM Query:

source="*" ("TLS handshake failed" OR "buffer overflow" OR "segmentation fault") AND process="*sharkssl*"

🔗 References

📤 Share & Export