SyncBreeze 15.2.24 contains a denial of service vulnerability in the login authentication mechanism that allows attackers to crash the service. Attackers can send an oversized password parameter with repeated 'password=' values to overwhelm the login endpoint and potentially disrupt service availability.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 16 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Flexense
Flexense syncbreeze
Vendors & Products Flexense
Flexense syncbreeze

Mon, 15 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 15 Dec 2025 20:45:00 +0000

Type Values Removed Values Added
Description SyncBreeze 15.2.24 contains a denial of service vulnerability in the login authentication mechanism that allows attackers to crash the service. Attackers can send an oversized password parameter with repeated 'password=' values to overwhelm the login endpoint and potentially disrupt service availability.
Title SyncBreeze 15.2.24 Denial of Service via Login Endpoint Overflow
Weaknesses CWE-400
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-15T21:48:06.462Z

Reserved: 2025-12-13T14:25:04.998Z

Link: CVE-2023-53873

cve-icon Vulnrichment

Updated: 2025-12-15T21:41:06.345Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-15T21:15:49.833

Modified: 2025-12-16T14:10:11.300

Link: CVE-2023-53873

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-16T17:11:21Z

Weaknesses