### [CVE-2024-45167](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45167) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered in UCI IDOL 2 (aka uciIDOL or IDOL2) through 2.12. Due to improper input validation, improper deserialization, and improper restriction of operations within the bounds of a memory buffer, IDOL2 is vulnerable to Denial-of-Service (DoS) attacks and possibly remote code execution. A certain XmlMessage document causes 100% CPU consumption. ### POC #### Reference - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-050.txt - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-051.txt #### Github No PoCs found on GitHub currently.