Impact
NATS‑Server’s WebSockets implementation allowed unbounded memory consumption when processing compressed NATS messages. An attacker can send a compressed message that explodes in size during decompression, exhausting memory and typically crashing the server. The flaw is a lack of independent memory‑stream bounds, resulting in a denial‑of‑service effect without requiring authentication.
Affected Systems
The vulnerability affects NATS‑IO NATS‑Server deployments that expose the WebSockets port to external networks. Versions earlier than 2.11.2 and 2.12.3 are vulnerable; later releases include the fix.
Risk and Exploitability
The CVSS score of 5.9 indicates a moderate severity. The EPSS score of less than 1% suggests a low likelihood of exploitation, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw over the network by sending a specially crafted compressed message before authentication. The denial‑of‑service outcome typically results in the operating system terminating the server process.
OpenCVE Enrichment
Github GHSA