CVE-2025-8696

7.5 HIGH

📋 TL;DR

CVE-2025-8696 is a denial-of-service vulnerability in Stork server's UI where unauthenticated attackers can send large data payloads to exhaust system memory and disk resources. This affects Stork versions 1.0.0 through 2.3.0. Organizations running vulnerable Stork servers with internet-accessible interfaces are at risk.

💻 Affected Systems

Products:
  • ISC Stork
Versions: 1.0.0 through 2.3.0
Operating Systems: All platforms running Stork
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable if the Stork UI is accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system resource exhaustion leading to server crash, service disruption, and potential data corruption from disk space depletion.

🟠

Likely Case

Degraded performance or temporary service unavailability due to memory/disk pressure, requiring manual intervention to restore service.

🟢

If Mitigated

Minimal impact with proper network segmentation and resource monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple resource exhaustion attack requiring no authentication or special tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.1

Vendor Advisory: https://kb.isc.org/docs/cve-2025-8696

Restart Required: Yes

Instructions:

1. Download Stork version 2.3.1 or later from ISC. 2. Stop the Stork service. 3. Install the updated version. 4. Restart the Stork service. 5. Verify the service is running correctly.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to Stork UI to trusted IP addresses only.

iptables -A INPUT -p tcp --dport 8080 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 8080 -j DROP

Resource Limits

linux

Implement system resource limits to prevent complete exhaustion.

ulimit -v 1048576
systemctl set-property stork.service MemoryLimit=1G

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit Stork UI access to internal trusted networks only.
  • Deploy rate limiting or web application firewall (WAF) rules to block large payloads to the Stork UI endpoint.

🔍 How to Verify

Check if Vulnerable:

Check Stork version with 'stork-server --version' or examine package version. If version is between 1.0.0 and 2.3.0 inclusive, system is vulnerable.

Check Version:

stork-server --version

Verify Fix Applied:

After patching, verify version is 2.3.1 or later and test by attempting to send large payloads to the UI (monitor resource usage).

📡 Detection & Monitoring

Log Indicators:

  • Unusually large HTTP requests to Stork UI endpoints
  • System log messages about memory/disk exhaustion
  • Stork service restart/crash logs

Network Indicators:

  • Large volume of data sent to Stork UI port (default 8080)
  • Multiple connection attempts from single source to UI

SIEM Query:

source="stork.log" AND ("memory" OR "disk" OR "resource") AND ("error" OR "warning" OR "exhausted")

🔗 References

📤 Share & Export