CVE-2025-11573
BaseFortify
Publication date: 2025-10-09
Last updated on: 2025-10-14
Assigner: AMZN
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| amazon | iondotnet | 1.3.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1286 | The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an infinite loop issue in the Amazon.IonDotnet library versions prior to v1.3.2. It allows a threat actor to cause a denial of service by providing a specially crafted text input that triggers the infinite loop.
How can this vulnerability impact me? :
The vulnerability can impact you by causing a denial of service (DoS) condition. An attacker can exploit the infinite loop to make the application using the vulnerable library unresponsive or crash, disrupting normal operations.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade the Amazon.IonDotnet library to version v1.3.2 or later. Note that as of August 20, 2025, this library has been deprecated and will not receive further updates.