The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-3510

CVE-2022-3510: Google Protobuf-java DoS Vulnerability

CVE-2022-3510 is a denial of service vulnerability in Google Protobuf-java caused by a parsing issue with Message-Type Extensions. This article covers technical details, affected versions, impact, and mitigation.

Published: February 17, 2026

CVE-2022-3510 Overview

CVE-2022-3510 is a denial of service vulnerability affecting Google Protocol Buffers (protobuf) Java implementations. The vulnerability exists in both protobuf-java core and protobuf-javalite libraries, where a parsing issue with Message-Type Extensions can lead to severe application availability impacts. This vulnerability is similar to CVE-2022-3171 but specifically targets the Message-Type Extensions parsing mechanism.

The flaw occurs when processing inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields. This causes objects to be converted back-and-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses that can effectively render an application unresponsive.

Critical Impact

Applications using vulnerable protobuf-java versions can be rendered unavailable through specially crafted inputs that trigger excessive garbage collection, causing denial of service conditions in production environments.

Affected Products

  • Google protobuf-java versions prior to 3.21.7, 3.20.3, 3.19.6, and 3.16.3
  • Google protobuf-javalite versions prior to 3.21.7, 3.20.3, 3.19.6, and 3.16.3

Discovery Timeline

  • 2022-12-12 - CVE-2022-3510 published to NVD
  • 2025-04-22 - Last updated in NVD database

Technical Details for CVE-2022-3510

Vulnerability Analysis

This denial of service vulnerability stems from inefficient handling of Message-Type Extensions during protocol buffer parsing operations. When the parser encounters multiple instances of non-repeated embedded messages containing repeated or unknown fields, it triggers a pathological pattern of object state transitions. The Java runtime continuously converts message objects between their mutable (builder) and immutable (built) states, creating significant memory allocation and deallocation pressure.

The vulnerability is particularly concerning because Protocol Buffers are widely used in microservices architectures, gRPC communications, and data serialization across distributed systems. An attacker who can send crafted protobuf messages to an application endpoint could exploit this parsing behavior to cause extended garbage collection pauses, effectively creating a denial of service condition without requiring authentication or special privileges.

Root Cause

The root cause lies in the message-type extension merging logic. Prior to the fix, extensions would build up immutable instances before merging them, which proved inefficient when processing messages with specific field patterns. The parsing constructor approach accumulated objects that needed to be converted between states, triggering excessive garbage collection activity. The fix refactors this behavior to merge from wire-format directly into mutable messages, eliminating the unnecessary object creation and state transitions.

Attack Vector

The attack vector is network-based, requiring an attacker to send specially crafted Protocol Buffer messages to a vulnerable application. The attack does not require user interaction or authentication. An attacker needs to:

  1. Identify an endpoint accepting protobuf-encoded messages
  2. Craft a message containing multiple instances of non-repeated embedded messages
  3. Include repeated or unknown fields within these embedded messages
  4. Send the malicious payload to trigger the mutable/immutable conversion cycle

The security patch addresses this by changing how message-type extensions are processed:

text
   * Optimized Java proto serialization gencode for protos having many extension ranges with few fields in between.
   * More thoroughly annotate public generated code in Java lite protocol buffers.
   * Fixed Bug in proto3 java lite repeated enum fields. Failed to call copyOnWrite before modifying previously built message. Causes modification to already "built" messages that should be immutable.
-  * Refactoring java full runtime to reuse sub-message builders and prepare to migrate parsing logic from parse constructor to builder.
   * Fix Java reflection serialization of empty packed fields.
+  * Refactoring java full runtime to reuse sub-message builders and prepare to
+    migrate parsing logic from parse constructor to builder.
+  * Move proto wireformat parsing functionality from the private "parsing
+    constructor" to the Builder class.
+  * Change the Lite runtime to prefer merging from the wireformat into mutable
+    messages rather than building up a new immutable object before merging. This
+    way results in fewer allocations and copy operations.
+  * Make message-type extensions merge from wire-format instead of building up instances and merging afterwards. This has much better performance.

   Python
   * Changes ordering of printed fields in .pyi files from lexicographic to the same ordering found in the proto descriptor.

Source: GitHub Protobuf Commit

Detection Methods for CVE-2022-3510

Indicators of Compromise

  • Unusual garbage collection activity with extended pause times in Java applications processing protobuf messages
  • Memory utilization spikes correlating with incoming protobuf message processing
  • Application response time degradation or timeouts in services using protobuf deserialization
  • JVM heap memory patterns showing rapid object allocation and deallocation cycles

Detection Strategies

  • Monitor JVM garbage collection metrics for abnormal pause durations exceeding baseline thresholds
  • Implement application performance monitoring (APM) to detect latency anomalies in protobuf parsing operations
  • Use dependency scanning tools to identify vulnerable protobuf-java or protobuf-javalite library versions in your software bill of materials (SBOM)
  • Configure alerting on memory exhaustion events in services that process external protobuf inputs

Monitoring Recommendations

  • Enable verbose GC logging (-Xlog:gc* for Java 11+) to capture detailed garbage collection behavior
  • Set up heap dump triggers for extended GC pauses to enable post-incident analysis
  • Implement rate limiting on endpoints accepting protobuf-encoded payloads to mitigate volumetric attacks
  • Deploy network traffic analysis to identify unusual patterns in protobuf message sizes or frequencies

How to Mitigate CVE-2022-3510

Immediate Actions Required

  • Upgrade protobuf-java to version 3.21.7, 3.20.3, 3.19.6, or 3.16.3 or later depending on your version branch
  • Upgrade protobuf-javalite to the corresponding patched versions
  • Audit all applications and services using Protocol Buffers for vulnerable library versions
  • Prioritize patching for internet-facing services and gRPC endpoints

Patch Information

Google has released security patches addressing this vulnerability across multiple version branches. The fix refactors the Java runtime to merge from wire-format directly into mutable messages rather than building up immutable instances before merging, significantly improving performance and eliminating the denial of service condition.

The security fix is available in commit db7c17803320525722f45c1d26fc08bc41d1bf48. Refer to the GitHub Protobuf Commit for complete patch details.

Workarounds

  • Implement input validation to reject protobuf messages exceeding expected complexity or size thresholds
  • Deploy application-level rate limiting for endpoints processing protobuf data
  • Configure JVM parameters to limit maximum GC pause times and enable concurrent garbage collection
  • Consider network segmentation to restrict access to vulnerable services until patching is complete
bash
# Maven dependency update example
# Update pom.xml to use patched protobuf-java version
# For 3.21.x branch:
# <dependency>
#   <groupId>com.google.protobuf</groupId>
#   <artifactId>protobuf-java</artifactId>
#   <version>3.21.7</version>
# </dependency>

# Gradle dependency update example
# implementation 'com.google.protobuf:protobuf-java:3.21.7'

# Verify installed version
mvn dependency:tree | grep protobuf

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechGoogle Protobuf

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.07%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • NVD-CWE-noinfo

  • CWE-400
  • Vendor Resources
  • GitHub Protobuf Commit
  • Related CVEs
  • CVE-2024-7254: Google Protobuf DOS Vulnerability

  • CVE-2024-24786: Protobuf JSON Unmarshal DoS Vulnerability

  • CVE-2022-3171: Google Protobuf DoS Vulnerability

  • CVE-2022-1941: Google Protobuf-cpp DoS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English