- Description
- Due to multiple time-of-check time-of-use race conditions in the resource count check and increment logic, as well as missing validations, users of the platform are able to exceed the allocation limits configured for their accounts/domains. This can be used by an attacker to degrade the infrastructure's resources and lead to denial of service conditions. Users are recommended to upgrade to Apache CloudStack versions 4.20.3.0 or 4.22.0.1, or later, which fixes this issue.
- Source
- security@apache.org
- NVD status
- Modified
- Products
- cloudstack
CVSS 3.1
- Type
- Primary
- Base score
- 5.3
- Impact score
- 3.6
- Exploitability score
- 1.6
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
- security@apache.org
- CWE-367
- Hype score
- Not currently trending
CVE-2025-69233 Due to multiple time-of-check time-of-use race conditions in the resource count check and increment logic, as well as missing validations, users of the platform are a… https://t.co/HYkHXDbSra
@CVEnew
9 May 2026
322 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-69233 Resource Exhaustion via Time-of-Check Time-of-Use Race Co... https://t.co/eDUPzKJpdG Don't wait vulnerability scanning results: https://t.co/oh1APvMMnd
@VulmonFeeds
8 May 2026
177 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B0820043-939A-4549-AE30-03196C079366",
"versionEndExcluding": "4.20.3.0",
"versionStartIncluding": "4.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78690ED1-C4B3-4DC9-9B53-FB31D6D17125",
"versionEndExcluding": "4.22.0.1",
"versionStartIncluding": "4.21.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]