Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-4068

CVE-2024-4068: Jonschlinkert Braces DOS Vulnerability

CVE-2024-4068 is a denial of service flaw in the NPM package Jonschlinkert Braces that causes memory exhaustion through imbalanced braces input. This article covers the technical details, affected versions, and mitigations.

Published: January 28, 2026

CVE-2024-4068 Overview

CVE-2024-4068 is a Memory Exhaustion vulnerability in the NPM package braces, versions prior to 3.0.3. The vulnerability exists because the package fails to limit the number of characters it can handle during parsing. When a malicious user sends "imbalanced braces" as input, the parsing logic in lib/parse.js enters an infinite loop, causing the program to continuously allocate heap memory without releasing it. This ultimately leads to JavaScript heap exhaustion and application crash.

The braces package is widely used in the Node.js ecosystem for brace expansion, making this vulnerability potentially impactful across numerous dependent packages and applications.

Critical Impact

Attackers can remotely cause denial of service by sending specially crafted input with imbalanced braces, leading to memory exhaustion and application crashes.

Affected Products

  • jonschlinkert braces versions prior to 3.0.3
  • Node.js applications using vulnerable braces package
  • Dependent packages in the micromatch ecosystem

Discovery Timeline

  • May 14, 2024 - CVE-2024-4068 published to NVD
  • December 31, 2025 - Last updated in NVD database

Technical Details for CVE-2024-4068

Vulnerability Analysis

The vulnerability resides in the parsing logic of the braces package, specifically within lib/parse.js. When processing input strings containing imbalanced braces, the parser enters a loop that continuously allocates memory on the JavaScript heap. The lack of proper input validation and resource limits allows an attacker to exploit this behavior by crafting malicious input strings.

The original implementation defined MAX_LENGTH as 1024 * 64 (65,536 characters) and included a MAX_SYMBOLS constant of 1024, but these safeguards were insufficient to prevent the memory exhaustion condition when processing imbalanced brace patterns. The parsing function would continue iterating without proper termination conditions, allocating new objects and strings without garbage collection until the V8 heap limit was reached.

Root Cause

The root cause is improper input validation (CWE-400: Uncontrolled Resource Consumption) combined with inadequate loop termination conditions (CWE-1050: Excessive Platform Resource Consumption within a Loop). The lib/parse.js module lacks proper validation to detect and reject malformed input containing imbalanced braces before entering the parsing loop, and once in the loop, there are no safeguards to prevent unbounded memory allocation.

Attack Vector

This vulnerability is exploitable over the network without requiring authentication or user interaction. An attacker can send specially crafted input containing imbalanced braces to any application that processes user-supplied data through the braces package. The attack requires no special privileges and can be executed remotely against any exposed endpoint that utilizes brace expansion functionality.

The security patch modified lib/constants.js to reduce MAX_LENGTH from 65,536 to 10,000 characters and removed the unused MAX_SYMBOLS constant:

javascript
 'use strict';
 
 module.exports = {
-  MAX_LENGTH: 1024 * 64,
-  MAX_SYMBOLS: 1024,
+  MAX_LENGTH: 10000,
 
   // Digits
   CHAR_0: '0', /* 0 */

Source: GitHub Commit Reference

The corresponding changes in lib/parse.js removed the dependency on validation utilities:

javascript
 'use strict';
 
 const stringify = require('./stringify');
-const {isCorrectBraces, validateInput} = require('./validate-input');
 
 /**
  * Constants
  */
 
 const {
   MAX_LENGTH,
-  MAX_SYMBOLS,
   CHAR_BACKSLASH, /* \ */
   CHAR_BACKTICK, /* ` */
   CHAR_COMMA, /* , */

Source: GitHub Commit Reference

Detection Methods for CVE-2024-4068

Indicators of Compromise

  • Sudden memory spikes in Node.js processes handling user input
  • Application crashes with JavaScript heap out of memory errors
  • Unusual patterns in request payloads containing excessive or imbalanced brace characters
  • High memory consumption in services using brace expansion functionality

Detection Strategies

  • Implement application performance monitoring (APM) to detect abnormal memory allocation patterns in Node.js applications
  • Review dependency trees using npm audit or yarn audit to identify vulnerable versions of the braces package
  • Monitor process-level resource utilization for Node.js services to detect memory exhaustion attempts
  • Analyze incoming request payloads for patterns of imbalanced braces or excessive special characters

Monitoring Recommendations

  • Configure alerts for V8 heap memory usage approaching critical thresholds in production environments
  • Implement logging for rejected or suspicious inputs containing unusual brace patterns
  • Set up dependency scanning in CI/CD pipelines to prevent deployment of vulnerable package versions
  • Monitor application logs for repeated crashes with heap allocation failures

How to Mitigate CVE-2024-4068

Immediate Actions Required

  • Update the braces package to version 3.0.3 or later immediately using npm update braces or yarn upgrade braces
  • Audit all projects for direct and transitive dependencies on vulnerable braces versions
  • Implement input length validation at application boundaries before passing data to brace expansion functions
  • Consider rate limiting on endpoints that process user-supplied patterns

Patch Information

The vulnerability is fixed in braces version 3.0.3. The fix reduces the maximum input length and improves loop handling to prevent memory exhaustion. Updates are available through standard NPM package management.

Relevant vendor resources:

  • GitHub Commit with Security Fix
  • GitHub Pull Request #37
  • GitHub Pull Request #40

Workarounds

  • Implement input validation to limit string length before processing with braces
  • Validate that input contains balanced braces before passing to the parser
  • Set Node.js memory limits using --max-old-space-size flag to limit blast radius of exploitation
  • Consider alternative brace expansion libraries if immediate patching is not feasible
bash
# Update braces package to patched version
npm update braces@^3.0.3

# Or use yarn
yarn upgrade braces@^3.0.3

# Verify installed version
npm list braces

# Run security audit
npm audit fix

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechJonschlinkert Braces

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.22%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-1050

  • CWE-400
  • Technical References
  • Checkmarx CVE-2024-4068 Details

  • GitHub Issue Discussion
  • Vendor Resources
  • GitHub Commit Reference

  • GitHub Pull Request #37

  • GitHub Pull Request #40
  • Latest CVEs
  • CVE-2025-49454: TinySalt Path Traversal Vulnerability

  • CVE-2025-48261: MultiVendorX Information Disclosure Flaw

  • CVE-2025-32119: CardGate WooCommerce SQL Injection Flaw

  • CVE-2025-26879: s2Member Plugin Reflected XSS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English