CVE-2024-45163

Published Aug 22, 2024

Last updated 17 days ago

CVSS critical 9.1
IoT
Mirai Botnet

Overview

AI description

Automated description summarized from trusted sources.

CVE-2024-45163 describes a vulnerability within the Mirai botnet, specifically concerning its handling of simultaneous TCP connections to the command and control (CNC) server. The issue allows unauthenticated sessions to remain open, which can lead to resource consumption on the server. This vulnerability, identified as an unauthenticated remote Denial of Service (DoS) in the Mirai C2 infrastructure, can be triggered by an attacker sending a recognized username (such as "root") or arbitrary data, causing the CNC server to mishandle these connections.

Description
The Mirai botnet through 2024-08-19 mishandles simultaneous TCP connections to the CNC (command and control) server. Unauthenticated sessions remain open, causing resource consumption. For example, an attacker can send a recognized username (such as root), or can send arbitrary data.
Source
cve@mitre.org
NVD status
Deferred

Risk scores

CVSS 3.1

Type
Secondary
Base score
9.1
Impact score
5.2
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Severity
CRITICAL

Weaknesses

134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-400

Social media

Hype score
Not currently trending
  1. In 2024, I found a way to kill any Mirai botnet command server on the internet with a single packet. No authentication needed. CVE-2024-45163. I'd been inside live Mirai C2 infrastructure at that point. Running network ops, coordinating takedowns, watching botnets spin up in htt

    @thejacobmasse

    11 Apr 2026

    50 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  2. CVE-2024-45163: Remote DoS in Mirai C2 โ€“ research writeup + what it led me to build https://t.co/tMWTJ6jaXR

    @_r_netsec

    7 Apr 2026

    328 Impressions

    2 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. We just launched Flowtriq on @ProductHunt ๐ŸŽ‰ I found a kill switch in the Mirai botnet (CVE-2024-45163). That research taught me what DDoS attacks look like at the packet level. So I built Flowtriq: โ†’ Installs in 2 minutes (pip install ftagent) โ†’ Detects DDoS attacks in

    @thejacobmasse

    31 Mar 2026

    36 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    1 Reply

    0 Quotes

  4. We just launched Flowtriq on @ProductHunt ๐ŸŽ‰ I found a kill switch in the Mirai botnet (CVE-2024-45163). That research taught me what DDoS attacks look like at the packet level. So I built Flowtriq: โ†’ Installs in 2 minutes (pip install ftagent) โ†’ Detects DDoS attacks in

    @thejacobmasse

    30 Mar 2026

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  5. CVE-2024-45163: Remote DoS in Mirai C2 โ€“ research writeup + what it led me to build https://t.co/lLUDrTZ67e

    @Dinosn

    15 Mar 2026

    1877 Impressions

    1 Retweet

    4 Likes

    4 Bookmarks

    0 Replies

    0 Quotes

  6. CVE-2024-45163: Remote DoS in Mirai C2 โ€“ research writeup + what it led me to build https://t.co/tMWTJ6jaXR

    @_r_netsec

    15 Mar 2026

    878 Impressions

    3 Retweets

    6 Likes

    2 Bookmarks

    1 Reply

    0 Quotes