CVE-2026-23490

7.5 HIGH

📋 TL;DR

This vulnerability in pyasn1 allows attackers to cause denial-of-service through memory exhaustion by sending malformed RELATIVE-OID data with excessive continuation octets. Any Python application using pyasn1 versions before 0.6.2 that processes untrusted ASN.1 data is affected. This could impact systems that parse certificates, network protocols, or other ASN.1 encoded data from external sources.

💻 Affected Systems

Products:
  • pyasn1 library
  • Any Python application using pyasn1
Versions: All versions prior to 0.6.2
Operating Systems: All operating systems running Python
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present in default configurations when processing malformed RELATIVE-OID data.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability due to memory exhaustion, potentially requiring system restart and causing extended downtime.

🟠

Likely Case

Service degradation or temporary unavailability affecting applications that process ASN.1 data from untrusted sources.

🟢

If Mitigated

Minimal impact if proper input validation and resource limits are in place, or if ASN.1 data only comes from trusted sources.

🌐 Internet-Facing: MEDIUM - Risk exists if applications process ASN.1 data from external sources, but requires specific malformed input.
🏢 Internal Only: LOW - Lower risk in controlled environments unless processing untrusted internal data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malformed ASN.1 data to vulnerable applications. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.6.2

Vendor Advisory: https://github.com/pyasn1/pyasn1/security/advisories/GHSA-63vm-454h-vhhq

Restart Required: No

Instructions:

1. Update pyasn1 to version 0.6.2 or later using pip: pip install --upgrade pyasn1 2. Verify the update was successful: pip show pyasn1 3. Restart any Python applications using pyasn1 to load the updated library.

🔧 Temporary Workarounds

Input validation and sanitization

all

Implement strict input validation for ASN.1 data before passing to pyasn1 library

Resource limiting

linux

Configure memory limits on processes using pyasn1 to prevent complete exhaustion

ulimit -v [memory_limit_in_kb] # Linux example

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems
  • Deploy WAF or application firewall rules to block malformed ASN.1 data patterns

🔍 How to Verify

Check if Vulnerable:

Check pyasn1 version: python -c "import pyasn1; print(pyasn1.__version__)" - if version is less than 0.6.2, system is vulnerable.

Check Version:

python -c "import pyasn1; print(pyasn1.__version__)"

Verify Fix Applied:

Verify pyasn1 version is 0.6.2 or higher: python -c "import pyasn1; print(pyasn1.__version__)"

📡 Detection & Monitoring

Log Indicators:

  • Memory exhaustion errors
  • Process crashes or restarts
  • High memory usage spikes in Python processes

Network Indicators:

  • Unusual ASN.1 data patterns in network traffic
  • Repeated malformed data packets to services using pyasn1

SIEM Query:

source="application_logs" AND ("memory exhausted" OR "out of memory" OR "pyasn1" OR "ASN.1")

🔗 References

📤 Share & Export