
Cloud Vulnerability DB
A community-led vulnerabilities database
A regular expression used in Apache MXNet (incubating) was identified as vulnerable to a potential denial-of-service attack through excessive resource consumption. The vulnerability, tracked as CVE-2022-24294, affects Apache MXNet versions prior to 1.9.1. The issue was discovered and reported by Dwi Siswanto (OpenWall, NVD).
The vulnerability exists in the RTC (Runtime Compilation) Module of Apache MXNet. The issue manifests when loading a model that contains a specially crafted operator name, which triggers excessive resource consumption during regular expression evaluation. The severity of this vulnerability is classified as low (OpenWall).
When exploited, this vulnerability can lead to a denial-of-service condition through excessive resource consumption during the regular expression evaluation process. The impact is limited to the processing of models with specifically crafted operator names (OpenWall).
Users depending on MXNet 1.x are advised to upgrade to MXNet version 1.9.1 or later (but less than version 2). This upgrade addresses the regular expression vulnerability and prevents potential denial-of-service attacks (OpenWall).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."