Description
OpenTelemetry dotnet is a dotnet telemetry framework. From 1.13.1 to before 1.15.2, When exporting telemetry over gRPC using the OpenTelemetry Protocol (OTLP), the exporter may parse a server-provided grpc-status-details-bin trailer during retry handling. Prior to the fix, a malformed trailer could encode an extremely large length-delimited protobuf field which was used directly for allocation, allowing excessive memory allocation and potential denial of service (DoS). This vulnerability is fixed in 1.15.2.
Published: 2026-04-23
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The flaw, characterized as CWE-789 Uncontrolled Memory Allocation, resides in the dotnet telemetry framework used for exporting telemetry via gRPC. Between releases 1.13.1 and just before 1.15.2, the exporter processes the server‑provided grpc‑status‑details‑bin trailer when a retry occurs. A malformed trailer can contain an extremely large length‑delimited protobuf field; that field’s size is used directly to allocate memory. An attacker who can supply such a trailer can force the exporter to allocate an excessive amount of memory, exhausting system resources and causing the exporter process or the host to become unresponsive.

Affected Systems

Vendors affected include OpenTelemetry for .NET, specifically the OpenTelemetry.Exporter.OpenTelemetryProtocol and opentelemetry-dotnet packages. All versions from 1.13.1 through to just before 1.15.2 are vulnerable. The recommendation is to upgrade to 1.15.2 or newer.

Risk and Exploitability

The CVSS base score is 5.3, indicating a moderate severity. The EPSS score is below 1%, suggesting a low probability of exploitation in the current period, and the vulnerability is not listed in the CISA KEV catalog. Attackers can likely exploit the weakness remotely by sending crafted grpc‑status‑details‑bin trailers during OTLP retry handling, as the failure occurs when parsing data received from a server over the network. Because the problem is triggered only during retry logic, an attacker must induce at least one retry and supply a malicious trailer to trigger the excessive allocation. It is a denial‑of‑service attack that disrupts availability.

Generated by OpenCVE AI on April 29, 2026 at 01:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the OpenTelemetry.Exporter.OpenTelemetryProtocol and opentelemetry‑dotnet packages to version 1.15.2 or later.
  • If an immediate upgrade is not possible, disable or limit OTLP gRPC retry handling in the exporter configuration to avoid processing server trailers.
  • Monitor the telemetry exporter for abnormal memory growth or crashes to detect potential exploitation attempts early.

Generated by OpenCVE AI on April 29, 2026 at 01:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mr8r-92fq-pj8p OpenTelemetry dotnet: Unbounded `grpc-status-details-bin` parsing in OTLP/gRPC retry handling
History

Wed, 29 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Opentelemetry opentelemetry
CPEs cpe:2.3:a:opentelemetry:opentelemetry:*:*:*:*:*:.net:*:*
Vendors & Products Opentelemetry opentelemetry

Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Opentelemetry
Opentelemetry opentelemetry-dotnet
Opentelemetry opentelemetry.exporter.opentelemetryprotocol
Vendors & Products Opentelemetry
Opentelemetry opentelemetry-dotnet
Opentelemetry opentelemetry.exporter.opentelemetryprotocol

Thu, 23 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Description OpenTelemetry dotnet is a dotnet telemetry framework. From 1.13.1 to before 1.15.2, When exporting telemetry over gRPC using the OpenTelemetry Protocol (OTLP), the exporter may parse a server-provided grpc-status-details-bin trailer during retry handling. Prior to the fix, a malformed trailer could encode an extremely large length-delimited protobuf field which was used directly for allocation, allowing excessive memory allocation and potential denial of service (DoS). This vulnerability is fixed in 1.15.2.
Title OpenTelemetry dotnet: Unbounded `grpc-status-details-bin` parsing in OTLP/gRPC retry handling
Weaknesses CWE-789
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Opentelemetry Opentelemetry Opentelemetry-dotnet Opentelemetry.exporter.opentelemetryprotocol
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-23T18:23:08.858Z

Reserved: 2026-04-15T16:37:22.766Z

Link: CVE-2026-40891

cve-icon Vulnrichment

Updated: 2026-04-23T18:22:55.571Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-23T18:16:28.483

Modified: 2026-04-29T14:15:05.133

Link: CVE-2026-40891

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T01:45:26Z

Weaknesses