The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-1941

CVE-2022-1941: Google Protobuf-cpp DoS Vulnerability

CVE-2022-1941 is a denial of service vulnerability in Google Protobuf-cpp caused by a MessageSet parsing flaw that leads to out-of-memory failures. This article covers the technical details, affected versions, and mitigation.

Published: February 17, 2026

CVE-2022-1941 Overview

CVE-2022-1941 is a parsing vulnerability affecting the MessageSet type in Google Protocol Buffers (protobuf) that can lead to out-of-memory failures and denial of service conditions. The vulnerability exists in both protobuf-cpp and protobuf-python implementations across multiple versions. A specially crafted message containing multiple key-value per elements creates parsing issues that can exhaust system memory, enabling attackers to disrupt services that process unsanitized protobuf input.

Protocol Buffers is Google's language-neutral, platform-neutral extensible mechanism for serializing structured data, widely used in gRPC, microservices architectures, and data interchange. This vulnerability is particularly concerning as protobuf is a foundational component in many enterprise applications and cloud services.

Critical Impact

Services receiving untrusted Protocol Buffer messages are vulnerable to denial of service attacks through memory exhaustion when processing maliciously crafted MessageSet type data.

Affected Products

  • Google protobuf-cpp versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1, and 3.21.5
  • Google protobuf-python versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1, and 4.21.5
  • Fedora 36 and Fedora 37
  • Debian Linux 10.0

Discovery Timeline

  • September 22, 2022 - CVE-2022-1941 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2022-1941

Vulnerability Analysis

The vulnerability resides in how Protocol Buffers handles the MessageSet wire format during parsing operations. The MessageSet type is an older, less commonly used protobuf feature that allows for a specific message extension format. When parsing messages of this type, the protobuf library does not properly validate or limit resource allocation for messages containing multiple key-value pairs per element.

The parsing logic fails to implement adequate bounds checking on memory allocation requests when processing the specially structured MessageSet data. This allows an attacker to craft a message that, when parsed, triggers excessive memory allocation that can quickly exhaust available system resources.

The attack is network-accessible and requires no authentication or user interaction, making it suitable for remote denial of service attacks against any service that accepts and parses Protocol Buffer messages from untrusted sources.

Root Cause

The root cause is classified as CWE-1286 (Improper Validation of Syntactically Incorrect Input). The protobuf parser does not properly validate the structure and resource requirements of MessageSet type messages before allocating memory. When encountering messages with abnormal key-value pair structures, the parser attempts to allocate memory proportional to the malformed input without implementing proper safeguards against resource exhaustion.

The parsing implementation trusts the message structure to be well-formed and allocates memory based on declared sizes or repeated elements without enforcing reasonable upper bounds or progressive memory usage checks.

Attack Vector

An attacker can exploit this vulnerability by sending a specially crafted Protocol Buffer message to any service that parses protobuf data from untrusted sources. The attack vector is network-based and does not require authentication.

The exploitation scenario involves:

  1. Identifying a target service that accepts Protocol Buffer encoded messages
  2. Crafting a malicious MessageSet type message with multiple key-value pairs designed to trigger excessive memory allocation
  3. Sending the crafted message to the target service
  4. The service's protobuf parser processes the message, triggering out-of-memory conditions
  5. The service becomes unresponsive or crashes due to memory exhaustion

This vulnerability is particularly dangerous in microservices environments where protobuf is commonly used for inter-service communication, as a single malicious message could cascade failures across dependent services.

Detection Methods for CVE-2022-1941

Indicators of Compromise

  • Unusual memory consumption spikes in services processing Protocol Buffer messages
  • Out-of-memory errors or service crashes correlated with incoming protobuf message processing
  • Abnormally large or malformed Protocol Buffer messages in network traffic
  • Repeated service restarts due to memory exhaustion in protobuf-dependent applications

Detection Strategies

  • Monitor memory usage patterns of applications using protobuf libraries for sudden, unexplained growth
  • Implement application-level logging to track protobuf message parsing operations and identify anomalies
  • Deploy network traffic analysis to detect unusually large or malformed Protocol Buffer messages
  • Use software composition analysis (SCA) tools to identify vulnerable protobuf library versions in your codebase

Monitoring Recommendations

  • Set up memory threshold alerts for services that process external Protocol Buffer messages
  • Implement rate limiting on endpoints that accept protobuf input from untrusted sources
  • Enable verbose logging during parsing operations to capture details of messages that cause errors
  • Regularly audit dependencies to ensure protobuf libraries are updated to patched versions

How to Mitigate CVE-2022-1941

Immediate Actions Required

  • Upgrade protobuf-cpp to versions 3.18.3, 3.19.5, 3.20.2, or 3.21.6
  • Upgrade protobuf-python to versions 3.18.3, 3.19.5, 3.20.2, or 4.21.6
  • Identify all applications and services using Protocol Buffers libraries in your environment
  • Apply operating system vendor patches for Fedora and Debian systems
  • Implement input validation and size limits on protobuf messages from untrusted sources

Patch Information

Google has released patched versions of Protocol Buffers addressing this vulnerability. The recommended upgrade paths are:

For protobuf-cpp: Upgrade to 3.18.3, 3.19.5, 3.20.2, or 3.21.6 depending on your current version line.

For protobuf-python: Upgrade to 3.18.3, 3.19.5, 3.20.2, or 4.21.6 depending on your current version line.

Note that versions 3.16.x and 3.17.x are no longer receiving updates. Users on these version lines must migrate to a supported version to receive the security fix.

For detailed information, refer to the GitHub Security Advisory GHSA-8gq9-2x98-w8hf and the Google Cloud Security Bulletin.

Workarounds

  • Implement message size limits at the application or network layer to reject abnormally large protobuf messages before parsing
  • Add memory limits and resource quotas to services processing untrusted protobuf input
  • Validate protobuf messages against expected schemas before full parsing when possible
  • Consider isolating protobuf parsing operations in sandboxed environments with strict resource constraints
bash
# Example: Setting memory limits for a service using systemd
# Edit the service unit file to add memory constraints
[Service]
MemoryLimit=512M
MemoryHigh=400M

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechGoogle Protobuf

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.14%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-1286

  • NVD-CWE-Other
  • Technical References
  • Openwall OSS Security Discussion

  • Google Cloud Security Bulletin

  • GitHub Security Advisory GHSA-8gq9-2x98-w8hf

  • Debian LTS Security Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • NetApp Security Advisory NTAP-20240705-0001
  • Related CVEs
  • CVE-2024-7254: Google Protobuf DOS Vulnerability

  • CVE-2022-3510: Google Protobuf-java DoS Vulnerability

  • CVE-2024-24786: Protobuf JSON Unmarshal DoS Vulnerability

  • CVE-2022-3171: Google Protobuf DoS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English