CVE-2022-38725
Java vulnerability analysis and mitigation

Overview

CVE-2022-38725 affects One Identity syslog-ng, a system logging daemon, versions 3.0 through 3.37. The vulnerability was discovered in the RFC3164 parser and was disclosed on January 23, 2023. The issue affects both the open-source edition and commercial products including syslog-ng Premium Edition 7.0.30 and syslog-ng Store Box 6.10.0 (NVD, GitHub Advisory).

Technical details

The vulnerability is an integer overflow in the RFC3164 parser that occurs when processing syslog input through the tcp or network function. When exploited, it causes a syslog-ng worker thread processing the message to enter a tight loop consuming 100% CPU time. Since syslog-ng typically runs multiple worker threads (one per CPU core), processing continues as long as at least one worker thread is running. However, repeated exploitation can trigger all threads to enter this erroneous state (GitHub Advisory).

Impact

The primary impact is Denial of Service (DoS), causing the affected syslog-ng process to stop processing and delivering messages. This disruption can hinder threat detection capabilities of Security Information and Event Management (SIEM) systems that rely on syslog-ng for log collection, ultimately impacting the broader Security Operations function (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in syslog-ng Open Source Edition version 3.38.1, Premium Edition 7.0.32, and Store Box versions 6.0.5 and 7.0.0 LTS. Temporary workarounds include implementing firewall rules to control access to the syslog port, using TLS mutual authentication for log traffic to allow only trusted senders, and implementing monitoring for syslog-ng processes to detect excessive CPU usage (GitHub Advisory, Gentoo Security).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55749HIGH8.7
  • JavaJava
  • org.xwiki.platform:xwiki-platform-tool-jetty-resources
NoYesDec 01, 2025
CVE-2025-13806MEDIUM6.9
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-13805MEDIUM6.3
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-13804MEDIUM5.3
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-66372LOW2.8
  • JavaJava
  • org.mustangproject:library
NoYesNov 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management