CVE-2025-27513

7.5 HIGH

📋 TL;DR

A vulnerability in OpenTelemetry.Api for .NET versions 1.10.0 to 1.11.1 causes Denial of Service when processing HTTP requests containing tracestate and traceparent headers. This triggers high CPU usage even when applications don't explicitly use trace context propagation, affecting any web-accessible application or backend service processing HTTP requests. The vulnerability can lead to degraded performance, increased latency, or complete downtime.

💻 Affected Systems

Products:
  • OpenTelemetry.Api for .NET
Versions: 1.10.0 to 1.11.1 inclusive
Operating Systems: All operating systems running .NET applications
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any application using OpenTelemetry.Api package, even if not explicitly using trace context propagation. Applications must process HTTP requests to be vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability due to resource exhaustion, affecting all users and potentially cascading to dependent services.

🟠

Likely Case

Degraded performance and increased latency during attack periods, with potential temporary service disruptions.

🟢

If Mitigated

Minimal impact with proper rate limiting and monitoring, though some performance degradation may still occur during attacks.

🌐 Internet-Facing: HIGH - Any internet-facing application using affected versions is vulnerable to unauthenticated DoS attacks via HTTP headers.
🏢 Internal Only: MEDIUM - Internal services are still vulnerable but attack surface is reduced compared to internet-facing systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending HTTP requests with specific headers, which is trivial for attackers. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.11.2

Vendor Advisory: https://github.com/open-telemetry/opentelemetry-dotnet/security/advisories/GHSA-8785-wc3w-h8q6

Restart Required: Yes

Instructions:

1. Update OpenTelemetry.Api package to version 1.11.2 or later. 2. Update package reference in your project file. 3. Rebuild and redeploy your application. 4. Restart the application service.

🔧 Temporary Workarounds

Header Filtering

all

Filter or block HTTP requests containing tracestate and traceparent headers at the web server or load balancer level.

Rate Limiting

all

Implement rate limiting on HTTP endpoints to mitigate DoS impact.

🧯 If You Can't Patch

  • Implement WAF rules to block or rate limit requests with tracestate headers
  • Deploy additional monitoring for CPU spikes and implement auto-scaling to handle increased load

🔍 How to Verify

Check if Vulnerable:

Check your project's package references for OpenTelemetry.Api version between 1.10.0 and 1.11.1.

Check Version:

dotnet list package --include-transitive | findstr OpenTelemetry.Api

Verify Fix Applied:

Verify OpenTelemetry.Api package version is 1.11.2 or later in your project dependencies.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CPU spikes
  • Increased request processing times
  • HTTP requests with tracestate headers in access logs

Network Indicators:

  • High volume of HTTP requests with tracestate headers
  • Unusual traffic patterns to vulnerable endpoints

SIEM Query:

source="web_server" AND (header="tracestate" OR header="traceparent") | stats count by src_ip

🔗 References

📤 Share & Export