Upcoming Webinar: Register now >>

Vulnerability Disclosure Statement

Overview

Date of Disclosure: 22-05-2025

OpenLM is issuing this disclosure to inform clients about a known vulnerability in a third-party dependency used within main components of our licensed software product. The affected third-party dependency is the System.Text.Json library (version 6.0.0), which has been identified with a security vulnerability (CVE-2024-43485) by Microsoft.

While OpenLM does not develop or maintain this dependency directly, it is bundled within main components of our product. This issue will be fully addressed in the upcoming release of the main components, where the vulnerable dependency will be upgraded to a secure version.

We are issuing this disclosure in the interest of transparency, customer security, and responsible vulnerability management.

Affected Products/Services 

Product/Service NameVersion(s) AffectedStatus
Main ComponentsVersions using System.Text.Json 6.0.0Update In Progress

Vulnerability Summary

  • CVE Identifier (if applicable): CVE-2024-43485
  • Vulnerability Type: Denial of Service (DoS)
  • CVSS Score: 7.5 High (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
  • Discovered by: Microsoft Security Response Center (MSRC)
  • Discovery Date: 2024-10-08

Technical details

  • Description: A vulnerability exists in System.Text.Json version 6.0.0, which could allow an attacker to trigger a denial-of-service (DoS) condition by submitting a specially crafted JSON payload. This affects applications that use the serializer to process untrusted JSON inputs.
  • Impact: If exploited, this issue could result in high CPU usage, unresponsiveness, or crashes, potentially disrupting operations.

Mitigation & Resolution

 

Resolution Date: Planned for next patched version release
Remediation Actions: OpenLM has audited the usage of System.Text.Json within our main components and confirmed the vulnerability. We are actively working on:

  • Updating the affected dependency to version 6.0.10 or later.
  • Releasing a patched version that includes the secure version of the library.

This fix will be included in the next official release of the main components. Clients will be notified as soon as the updated version is available.

User Action Required: No immediate action required for customers who wait for the upcoming release.

 

Acknowledgement

OpenLM thanks the Microsoft Security Response Center for identifying and documenting this vulnerability, and our internal engineering team for auditing and addressing the issue.

Reference

Skip to content