Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-7246

Summary
Assigner-Google
Assigner Org ID-14ed7db2-1595-443d-9d34-6215bf890778
Published At-06 Aug, 2024 | 10:14
Updated At-06 Aug, 2024 | 13:17
Rejected At-
Credits

HPACK table poisoning in gRPC C++, Python & Ruby

It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header keys, but not values. This occurs because the error status for a misencoded header is not cleared between header reads, resulting in subsequent (incrementally indexed) added headers in the first request being poisoned until cleared from the HPACK table. Please update to a fixed version of gRPC as soon as possible. This bug has been fixed in 1.58.3, 1.59.5, 1.60.2, 1.61.3, 1.62.3, 1.63.2, 1.64.3, 1.65.4.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Google
Assigner Org ID:14ed7db2-1595-443d-9d34-6215bf890778
Published At:06 Aug, 2024 | 10:14
Updated At:06 Aug, 2024 | 13:17
Rejected At:
▼CVE Numbering Authority (CNA)
HPACK table poisoning in gRPC C++, Python & Ruby

It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header keys, but not values. This occurs because the error status for a misencoded header is not cleared between header reads, resulting in subsequent (incrementally indexed) added headers in the first request being poisoned until cleared from the HPACK table. Please update to a fixed version of gRPC as soon as possible. This bug has been fixed in 1.58.3, 1.59.5, 1.60.2, 1.61.3, 1.62.3, 1.63.2, 1.64.3, 1.65.4.

Affected Products
Vendor
Google LLCGoogle
Product
gRPC
Repo
https://github.com/grpc
Default Status
unaffected
Versions
Affected
  • 1.53.0 (custom)
  • 1.53.1 (custom)
  • 1.53.2 (custom)
  • 1.54.0 (custom)
  • 1.54.1 (custom)
  • 1.54.3 (custom)
  • 1.55.0 (custom)
  • 1.55.1 (custom)
  • 1.55.3 (custom)
  • 1.55.4 (custom)
  • 1.56.0 (custom)
  • 1.56.1 (custom)
  • 1.56.2 (custom)
  • 1.56.3 (custom)
  • 1.56.4 (custom)
  • 1.57.0 (custom)
  • 1.57.1 (custom)
  • 1.58.0 (custom)
  • 1.58.1 (custom)
  • 1.58.2 (custom)
  • 1.59.0 (custom)
  • 1.59.1 (custom)
  • 1.59.2 (custom)
  • 1.59.3 (custom)
  • 1.59.4 (custom)
  • 1.60.0 (custom)
  • 1.60.1 (custom)
  • 1.61.0 (custom)
  • 1.61.1 (custom)
  • 1.62.0 (custom)
  • 1.61.2 (custom)
  • 1.62.1 (custom)
  • 1.62.2 (custom)
  • 1.63.0 (custom)
  • 1.63.1 (custom)
  • 1.64.0 (custom)
  • 1.64.1 (custom)
  • 1.64.2 (custom)
  • 1.65.0 (custom)
  • 1.65.1 (custom)
  • 1.65.2 (custom)
  • 1.65.3 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-440CWE-440: Expected Behavior Violation
Type: CWE
CWE ID: CWE-440
Description: CWE-440: Expected Behavior Violation
Metrics
VersionBase scoreBase severityVector
4.06.3MEDIUM
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
Version: 4.0
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-220CAPEC-220 Client-Server Protocol Manipulation
CAPEC ID: CAPEC-220
Description: CAPEC-220 Client-Server Protocol Manipulation
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/grpc/grpc/issues/36245
N/A
Hyperlink: https://github.com/grpc/grpc/issues/36245
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve-coordination@google.com
Published At:06 Aug, 2024 | 11:16
Updated At:22 Jul, 2025 | 19:29

It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header keys, but not values. This occurs because the error status for a misencoded header is not cleared between header reads, resulting in subsequent (incrementally indexed) added headers in the first request being poisoned until cleared from the HPACK table. Please update to a fixed version of gRPC as soon as possible. This bug has been fixed in 1.58.3, 1.59.5, 1.60.2, 1.61.3, 1.62.3, 1.63.2, 1.64.3, 1.65.4.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.06.3MEDIUM
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 4.0
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CPE Matches

grpc
grpc
>>grpc>>Versions before 1.58.3(exclusive)
cpe:2.3:a:grpc:grpc:*:*:*:*:*:-:*:*
grpc
grpc
>>grpc>>Versions from 1.59.0(inclusive) to 1.59.5(exclusive)
cpe:2.3:a:grpc:grpc:*:*:*:*:*:-:*:*
grpc
grpc
>>grpc>>Versions from 1.60.0(inclusive) to 1.60.2(exclusive)
cpe:2.3:a:grpc:grpc:*:*:*:*:*:-:*:*
grpc
grpc
>>grpc>>Versions from 1.61.0(inclusive) to 1.61.3(exclusive)
cpe:2.3:a:grpc:grpc:*:*:*:*:*:-:*:*
grpc
grpc
>>grpc>>Versions from 1.62.0(inclusive) to 1.62.3(exclusive)
cpe:2.3:a:grpc:grpc:*:*:*:*:*:-:*:*
grpc
grpc
>>grpc>>Versions from 1.63.0(inclusive) to 1.63.2(exclusive)
cpe:2.3:a:grpc:grpc:*:*:*:*:*:-:*:*
grpc
grpc
>>grpc>>Versions from 1.64.0(inclusive) to 1.64.3(exclusive)
cpe:2.3:a:grpc:grpc:*:*:*:*:*:-:*:*
grpc
grpc
>>grpc>>Versions from 1.65.0(inclusive) to 1.65.4(exclusive)
cpe:2.3:a:grpc:grpc:*:*:*:*:*:-:*:*
Weaknesses
CWE IDTypeSource
CWE-440Secondarycve-coordination@google.com
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: CWE-440
Type: Secondary
Source: cve-coordination@google.com
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/grpc/grpc/issues/36245cve-coordination@google.com
Exploit
Issue Tracking
Patch
Hyperlink: https://github.com/grpc/grpc/issues/36245
Source: cve-coordination@google.com
Resource:
Exploit
Issue Tracking
Patch

Change History

0
Information is not available yet

Similar CVEs

9Records found

CVE-2024-22013
Matching Score-8
Assigner-Google Devices
ShareView Details
Matching Score-8
Assigner-Google Devices
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 25.67%
||
7 Day CHG~0.00%
Published-16 Sep, 2024 | 19:52
Updated-06 Nov, 2024 | 21:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

U-Boot environment is read from unauthenticated partition.

Action-Not Available
Vendor-Google LLC
Product-Nest Wifi Pro
CVE-2024-22006
Matching Score-8
Assigner-Google Devices
ShareView Details
Matching Score-8
Assigner-Google Devices
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 25.09%
||
7 Day CHG~0.00%
Published-11 Mar, 2024 | 18:55
Updated-03 Apr, 2025 | 15:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OOB read in the TMU plugin that allows for memory disclosure in the power management subsystem of the device.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-10604
Matching Score-8
Assigner-Google LLC
ShareView Details
Matching Score-8
Assigner-Google LLC
CVSS Score-6.9||MEDIUM
EPSS-0.05% / 16.68%
||
7 Day CHG~0.00%
Published-30 Jan, 2025 | 19:17
Updated-29 Jul, 2025 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Identifiable Header Values In Fuchsia Leading To Tracking of The User

Vulnerabilities in the algorithms used by Fuchsia to populate network protocol header fields, specifically the TCP ISN, TCP timestamp, TCP and UDP source ports, and IPv4/IPv6 fragment ID allow for these values to be guessed under circumstances

Action-Not Available
Vendor-Google LLC
Product-fuchsiaFuchsia
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2024-10603
Matching Score-8
Assigner-Google LLC
ShareView Details
Matching Score-8
Assigner-Google LLC
CVSS Score-6.3||MEDIUM
EPSS-0.05% / 14.23%
||
7 Day CHG+0.01%
Published-30 Jan, 2025 | 19:14
Updated-29 Jul, 2025 | 18:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Weaknesses in the generation of TCP/UDP source ports and some other header values in Google's gVisor allowed them to be predicted by an external attacker in some circumstances.

Action-Not Available
Vendor-Google LLC
Product-gvisorgVisor
CWE ID-CWE-340
Generation of Predictable Numbers or Identifiers
CVE-2024-0016
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.5||MEDIUM
EPSS-0.14% / 34.06%
||
7 Day CHG~0.00%
Published-16 Feb, 2024 | 19:33
Updated-16 Dec, 2024 | 14:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple locations, there is a possible out of bounds read due to a missing bounds check. This could lead to paired device information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-40122
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 15.99%
||
7 Day CHG~0.00%
Published-16 Feb, 2024 | 00:08
Updated-26 Nov, 2024 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In applyCustomDescription of SaveUi.java, there is a possible way to view other user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CVE-2019-13711
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-5.3||MEDIUM
EPSS-0.36% / 57.06%
||
7 Day CHG~0.00%
Published-25 Nov, 2019 | 14:22
Updated-05 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient policy enforcement in JavaScript in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

Action-Not Available
Vendor-openSUSEGoogle LLC
Product-chromebackportsChrome
CVE-2023-32731
Matching Score-6
Assigner-Google LLC
ShareView Details
Matching Score-6
Assigner-Google LLC
CVSS Score-7.4||HIGH
EPSS-0.07% / 21.79%
||
7 Day CHG~0.00%
Published-09 Jun, 2023 | 10:54
Updated-26 Sep, 2024 | 19:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information leak in gRPC

When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in  https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005

Action-Not Available
Vendor-grpcgrpcGoogle LLC
Product-grpcgRPCgrpc
CWE ID-CWE-440
Expected Behavior Violation
CVE-2023-32732
Matching Score-6
Assigner-Google LLC
ShareView Details
Matching Score-6
Assigner-Google LLC
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 4.28%
||
7 Day CHG~0.00%
Published-09 Jun, 2023 | 10:48
Updated-13 Feb, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial-of-Service in gRPC

gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in  https://github.com/grpc/grpc/pull/32309 https://www.google.com/url

Action-Not Available
Vendor-grpcgrpcFedora ProjectGoogle LLC
Product-fedoragrpcgRPCgrpc
CWE ID-CWE-440
Expected Behavior Violation
Details not found