Description
Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected.
Published: 2023-09-13
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-2551 Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected. 
Github GHSA Github GHSA GHSA-p25m-jpj4-qcrr Denial of Service Vulnerability in gRPC TCP Server (Posix-compatible platforms)
History

Mon, 12 Jan 2026 15:45:00 +0000

Type Values Removed Values Added
Description Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected.  Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected.
Title Denial of Service in gRPC Core Denial of Service in gRPC Core

Wed, 25 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:grpc:grpc:*:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2026-01-12T15:34:12.725Z

Reserved: 2023-09-06T04:50:57.530Z

Link: CVE-2023-4785

cve-icon Vulnrichment

Updated: 2024-08-02T07:38:00.495Z

cve-icon NVD

Status : Modified

Published: 2023-09-13T17:15:10.227

Modified: 2026-01-12T16:16:03.493

Link: CVE-2023-4785

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-09-14T00:00:00Z

Links: CVE-2023-4785 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses