CVE-2025-11573

7.5 HIGH

📋 TL;DR

This CVE describes an infinite loop vulnerability in Amazon.IonDotnet library versions before v1.3.2. Attackers can cause denial of service by sending specially crafted text input to applications using this library. Anyone using affected versions of Amazon.IonDotnet is vulnerable.

💻 Affected Systems

Products:
  • Amazon.IonDotnet
Versions: All versions < v1.3.2
Operating Systems: All platforms running .NET applications
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using Amazon.IonDotnet library to parse Ion text format is vulnerable. The library has been deprecated as of August 20, 2025.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability due to resource exhaustion from infinite loop, potentially affecting multiple dependent services.

🟠

Likely Case

Targeted denial of service against specific endpoints or services that process Ion text input, causing temporary service disruption.

🟢

If Mitigated

Minimal impact with proper input validation and monitoring, though risk remains if vulnerable version is exposed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted text input to vulnerable endpoints. No authentication needed if input processing is exposed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.3.2

Vendor Advisory: https://github.com/amazon-ion/ion-dotnet/security/advisories/GHSA-q5r6-9qwq-g2wj

Restart Required: Yes

Instructions:

1. Update NuGet package reference to Amazon.IonDotnet v1.3.2. 2. Rebuild and redeploy affected applications. 3. Restart services using the updated library.

🔧 Temporary Workarounds

Input validation and sanitization

all

Implement strict input validation and size limits for Ion text processing endpoints

Rate limiting and monitoring

all

Apply rate limiting to endpoints processing Ion text and monitor for abnormal resource usage

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block suspicious Ion text patterns
  • Isolate vulnerable services behind reverse proxies with request filtering and timeouts

🔍 How to Verify

Check if Vulnerable:

Check project dependencies for Amazon.IonDotnet version < 1.3.2 via NuGet package manager or project files

Check Version:

dotnet list package | findstr Amazon.IonDotnet

Verify Fix Applied:

Confirm Amazon.IonDotnet version is >= 1.3.2 in package references and deployed binaries

📡 Detection & Monitoring

Log Indicators:

  • High CPU usage spikes
  • Application hangs or timeouts
  • OutOfMemoryException logs
  • Request processing taking abnormally long

Network Indicators:

  • Repeated requests with similar Ion text payloads
  • Unusually large text payloads to Ion processing endpoints

SIEM Query:

source="application_logs" AND ("high cpu" OR "timeout" OR "hang") AND process_name="*ion*"

🔗 References

📤 Share & Export