Impact
A missing sanity check on WebSocket frames allows an unauthenticated attacker to send a crafted frame that overflows a buffer and triggers a server panic in the NATS Server. When the panic occurs, the entire server process terminates, causing a denial of service to all clients connected to the affected instance. This vulnerability is rooted in integer overflow and unchecked buffer length handling, as highlighted by CWE-1286 and CWE-190.
Affected Systems
The flaw exists in NATS-IO NATS Server versions starting at 2.2.0 and continuing through 2.11.13 and 2.12.4. Versions 2.11.14 and 2.12.5 and later contain the fix. The issue is relevant only when WebSockets are enabled and the service is accessible to untrusted network endpoints.
Risk and Exploitability
With a CVSS score of 7.5 the vulnerability is classified as high severity. The EPSS score is below 1%, indicating a low probability of widespread exploitation, and it is not listed in the CISA KEV catalog. However, the attack vector is straightforward: any host that can reach the WebSocket port can send a malicious frame before authentication, making remote exploitation possible over the network.
OpenCVE Enrichment
Github GHSA