CVE-2024-53857

7.5 HIGH

📋 TL;DR

CVE-2024-53857 is a resource exhaustion vulnerability in rPGP, a pure Rust OpenPGP implementation. Attackers can craft malicious messages to cause denial of service through excessive resource consumption. This affects all users parsing OpenPGP messages or decrypting with symmetric keys using vulnerable rPGP versions.

💻 Affected Systems

Products:
  • rPGP (Rust OpenPGP implementation)
Versions: All versions prior to 0.14.1
Operating Systems: All platforms running rPGP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both message parsing and symmetric key decryption operations. Any application using rPGP library is vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability due to resource exhaustion (CPU/memory), potentially leading to system crashes or extended downtime.

🟠

Likely Case

Degraded performance or temporary service interruptions when processing malicious OpenPGP messages.

🟢

If Mitigated

Minimal impact with proper input validation and resource limits in place.

🌐 Internet-Facing: HIGH - Attackers can send crafted messages to internet-facing services using rPGP without authentication.
🏢 Internal Only: MEDIUM - Requires attacker access to internal systems or ability to submit crafted messages through internal channels.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Crafting malicious OpenPGP messages requires minimal technical skill.

Exploitation requires ability to submit crafted messages to vulnerable systems. No authentication needed for message parsing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.14.1

Vendor Advisory: https://github.com/rpgp/rpgp/security/advisories/GHSA-4grw-m28r-q285

Restart Required: Yes

Instructions:

1. Update rPGP dependency to version 0.14.1 or later. 2. Update Cargo.toml: rpgp = "^0.14.1". 3. Run 'cargo update'. 4. Rebuild and redeploy applications. 5. Restart affected services.

🔧 Temporary Workarounds

Input validation and rate limiting

all

Implement strict input validation and rate limiting for OpenPGP message processing

Resource limits

linux

Set CPU and memory limits on processes using rPGP to contain resource exhaustion

ulimit -v 1048576
systemctl set-property service_name CPUQuota=50%

🧯 If You Can't Patch

  • Implement network-level filtering to block or rate limit OpenPGP message traffic from untrusted sources
  • Deploy monitoring for resource exhaustion patterns and implement automated response for abnormal resource usage

🔍 How to Verify

Check if Vulnerable:

Check Cargo.lock or Cargo.toml for rpgp dependency version below 0.14.1

Check Version:

cargo tree | grep rpgp

Verify Fix Applied:

Confirm rpgp version is 0.14.1 or higher in Cargo.lock: grep -A2 -B2 rpgp Cargo.lock

📡 Detection & Monitoring

Log Indicators:

  • Abnormal CPU/memory spikes during message parsing
  • Process crashes or restarts during OpenPGP operations
  • Increased error rates in OpenPGP processing

Network Indicators:

  • Unusually large OpenPGP messages
  • High volume of OpenPGP message traffic from single sources

SIEM Query:

source="application_logs" AND ("rpgp" OR "OpenPGP") AND ("high_cpu" OR "out_of_memory" OR "process_crash")

🔗 References

📤 Share & Export