
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in Google's gRPC starting from version 1.23 on POSIX-compatible platforms (e.g., Linux) was identified. The vulnerability (CVE-2023-4785) stems from a lack of error handling in the TCP server, which allows attackers to cause a denial of service by initiating a significant number of connections with the server. This vulnerability specifically affects gRPC C++, Python, and Ruby implementations, while gRPC Java and Go implementations are not affected (NVD).
The vulnerability is characterized by improper handling of file descriptor exhaustion in the TCP server component. It has been assigned a CVSS v3.1 Base Score of 7.5 (HIGH), with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The issue was addressed through improved server handling of file descriptor exhaustion, as documented in the fix (GitHub PR).
When exploited, this vulnerability can lead to a denial of service condition through file descriptor exhaustion. The attack can be executed by establishing multiple connections to the server, potentially rendering the service unavailable to legitimate users (NVD).
The vulnerability has been patched in multiple versions of gRPC. Users are advised to upgrade to versions 1.53.2, 1.54.3, 1.55.3, or later. The fix has been backported to several release branches through a series of pull requests (GitHub PR 33667, GitHub PR 33669, GitHub PR 33670, GitHub PR 33672).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."