The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-45061

CVE-2022-45061: Python IDNA Decoder DOS Vulnerability

CVE-2022-45061 is a denial of service flaw in Python's IDNA decoder that allows attackers to trigger excessive CPU consumption through crafted hostnames. This article covers technical details, affected versions, and patches.

Published: February 11, 2026

CVE-2022-45061 Overview

CVE-2022-45061 is a denial of service vulnerability discovered in Python's IDNA (Internationalized Domain Names in Applications) decoder implementation as defined in RFC 3490. The vulnerability stems from an unnecessary quadratic algorithm that processes certain inputs, allowing an attacker to craft unreasonably long hostnames that cause excessive CPU consumption when processed by the decoder.

This vulnerability is particularly concerning because hostnames are frequently supplied by remote servers that could be controlled by malicious actors. In practical attack scenarios, an attacker could trigger excessive CPU consumption on client systems attempting to process attacker-supplied hostnames. For example, the malicious payload could be delivered via the Location header in an HTTP 302 redirect response, causing the victim's system to exhaust CPU resources while processing the crafted hostname.

Critical Impact

Remote attackers can cause CPU denial of service by supplying crafted hostnames through various vectors including HTTP redirect headers, potentially affecting any Python application that processes external URLs or domain names.

Affected Products

  • Python versions before 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16
  • Fedora 35, 36, and 37
  • NetApp Active IQ Unified Manager (VMware vSphere and Windows)
  • NetApp E-Series Performance Analyzer
  • NetApp Element Software
  • NetApp HCI and HCI Compute Node
  • NetApp Management Services for Element Software
  • NetApp ONTAP Select Deploy Administration Utility
  • NetApp Bootstrap OS

Discovery Timeline

  • November 9, 2022 - CVE-2022-45061 published to NVD
  • November 3, 2025 - Last updated in NVD database

Technical Details for CVE-2022-45061

Vulnerability Analysis

The vulnerability exists within Python's IDNA decoder, which is responsible for converting internationalized domain names to their ASCII-compatible encoding (Punycode). The IDNA standard (RFC 3490) allows domain names to contain Unicode characters, which must be processed and converted for DNS lookups.

The core issue is an algorithmic complexity flaw (CWE-407) where certain code paths in the IDNA decoder exhibit quadratic time complexity O(n²) instead of the expected linear complexity O(n). When processing a carefully crafted hostname with specific character sequences, the decoder enters a computationally expensive processing loop that scales poorly with input length.

An attacker can exploit this by presenting an extremely long, specially crafted hostname to any Python application that processes external domain names. The quadratic nature of the algorithm means that doubling the input length quadruples the processing time, allowing relatively small payloads to consume significant CPU resources.

Root Cause

The root cause is an inefficient algorithm in the IDNA decoder's processing path. When handling certain input patterns, the decoder performs redundant operations that scale quadratically with the input length. This algorithmic inefficiency allows crafted inputs to consume disproportionate CPU resources relative to their size.

The issue specifically affects the hostname decoding functionality, which is invoked whenever Python applications process URLs, make HTTP requests, or handle any network operations involving domain names. The fix involves optimizing the algorithm to eliminate the quadratic complexity in the affected code path.

Attack Vector

The attack can be executed remotely over the network without any authentication or user interaction required. Common attack vectors include:

HTTP Redirect Exploitation: An attacker controlling a web server can respond to requests with a 302 redirect containing a malicious hostname in the Location header. When the client follows the redirect, Python's URL processing code invokes the vulnerable IDNA decoder.

DNS Response Manipulation: In scenarios where attackers can influence DNS responses or provide hostnames through other network protocols, the malicious payload can be delivered to trigger the vulnerability.

User-Supplied URLs: Applications that accept and process URLs from untrusted sources (web scrapers, API clients, link validators) are particularly susceptible as users can directly supply crafted hostnames.

The attack requires no special privileges and can be launched against any Python application that processes external hostnames, making it a significant availability concern for networked Python applications.

Detection Methods for CVE-2022-45061

Indicators of Compromise

  • Abnormally high CPU utilization by Python processes without corresponding increase in legitimate workload
  • HTTP clients hanging or timing out when processing redirect responses
  • Network connections to suspicious domains with unusually long or malformed hostnames
  • System logs showing Python processes consuming excessive CPU during URL or hostname processing operations

Detection Strategies

  • Monitor Python process CPU usage patterns and alert on sustained high utilization that exceeds baseline thresholds
  • Implement network traffic analysis to detect HTTP responses with abnormally long Location headers or unusual hostname patterns
  • Deploy application-level logging to capture and analyze hostnames being processed, flagging those exceeding reasonable length thresholds
  • Utilize endpoint detection solutions to identify Python processes exhibiting algorithmic complexity attack patterns

Monitoring Recommendations

  • Configure resource monitoring to track CPU utilization per Python process with alerting on anomalies
  • Implement request logging at application boundaries to capture incoming URLs and hostnames for retrospective analysis
  • Deploy network monitoring to identify potential attack vectors such as malicious redirects from external servers
  • Establish baseline metrics for normal Python application CPU consumption to enable accurate anomaly detection

How to Mitigate CVE-2022-45061

Immediate Actions Required

  • Update Python to patched versions: 3.11.1, 3.10.9, 3.9.16, 3.8.16, or 3.7.16 or later
  • Audit Python applications for external URL/hostname processing and implement input validation
  • Consider implementing request timeouts and CPU resource limits for Python processes handling external data
  • Review HTTP client configurations to limit redirect depth and implement hostname validation

Patch Information

Python has released security patches addressing this vulnerability in the following versions:

BranchFixed Version
3.11.x3.11.1
3.10.x3.10.9
3.9.x3.9.16
3.8.x3.8.16
3.7.x3.7.16

Organizations should update to the latest available version within their supported Python branch. For detailed information, refer to the CPython GitHub Issue Discussion.

Distribution-specific patches are available from Fedora, Debian LTS, and Gentoo.

Workarounds

  • Implement hostname length validation before passing untrusted hostnames to Python's URL processing functions
  • Configure HTTP client libraries to limit redirect following and implement timeout mechanisms
  • Use application firewalls or proxies to filter requests/responses containing abnormally long hostnames
  • Deploy resource limits (cgroups, ulimit) on Python processes to bound CPU consumption
bash
# Example: Limit CPU time for Python processes using ulimit
# Add to shell configuration or systemd service file
ulimit -t 60  # Limit CPU time to 60 seconds

# Example: Use timeout command for Python scripts processing external data
timeout --signal=KILL 30s python your_script.py

# Example: systemd service CPU limiting
# Add to [Service] section of unit file
CPUQuota=50%

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechPython

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.11%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-407
  • Technical References
  • Debian LTS Advisory May 2023

  • Debian LTS Advisory June 2023

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Gentoo GLSA 2023-05-02

  • NetApp Security Advisory

  • Debian LTS Advisory November 2024
  • Vendor Resources
  • GitHub Issue Discussion
  • Related CVEs
  • CVE-2025-13836: Python Python DOS Vulnerability

  • CVE-2026-0994: Google Protobuf Python DoS Vulnerability

  • CVE-2025-8194: CPython tarfile Module DoS Vulnerability

  • CVE-2024-8088: CPython zipfile.Path DOS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English