CVE-2024-1635: Uncontrolled Resource Consumption
A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available. At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree leaks via that task, which is added to XNIO WorkerThread. So, the workerThread points to the Undertow conduit, which contains the connections and causes the leak.
AI Analysis
Technical Summary
CVE-2024-1635 is a vulnerability in Undertow 1.31.0 affecting servers that support the wildfly-http-client protocol. The issue arises during the HTTP upgrade to remoting, where the WriteTimeoutStreamSinkConduit component leaks connections if the RemotingConnection is closed by the Remoting ServerConnectionOpenListener. Specifically, the remoting connection, which originates as part of the HTTP upgrade, has an external layer that is unaware of the connection closure during the opening procedure. Consequently, the WriteTimeoutStreamSinkConduit is not notified of the closure and continues to maintain a timeout task referencing the connection. This timeout task is added to the XNIO WorkerThread, causing the entire dependency tree, including the connection objects, to leak. When a malicious user repeatedly opens and immediately closes connections on the HTTP port, these leaked resources accumulate, eventually exhausting both memory and file descriptor limits on the server. This uncontrolled resource consumption leads to denial of service by making the server unresponsive or crashing it. The vulnerability does not impact confidentiality or integrity but severely affects availability. It requires no authentication or user interaction, making exploitation straightforward over the network. The CVSS 3.1 score of 7.5 reflects its high severity, primarily due to the ease of exploitation and the significant impact on availability. No known exploits are currently reported in the wild, but the vulnerability poses a serious risk to affected deployments.
Potential Impact
For European organizations, the primary impact of CVE-2024-1635 is a denial of service condition caused by resource exhaustion on servers running Undertow 1.31.0, particularly those using WildFly or similar Java middleware stacks that leverage the wildfly-http-client protocol. This can disrupt critical business applications, web services, and middleware-dependent infrastructure, leading to downtime and potential loss of productivity. Industries relying heavily on Java EE middleware, such as finance, telecommunications, and government services, may experience service interruptions. The vulnerability's ease of exploitation means attackers can cause outages without needing credentials or user interaction, increasing the risk of opportunistic attacks or targeted disruption. Additionally, the exhaustion of file descriptors can prevent new connections, compounding service unavailability. While no data confidentiality or integrity loss is expected, the availability impact can affect compliance with service-level agreements and regulatory requirements for uptime and resilience. Organizations with exposed HTTP ports running the vulnerable Undertow version are particularly at risk.
Mitigation Recommendations
1. Apply patches or updates from the Undertow project or your middleware vendor as soon as they become available to address the connection leak issue. 2. In the interim, implement network-level rate limiting or connection throttling on HTTP ports to reduce the risk of rapid open/close connection attacks. 3. Monitor server resource usage closely, including memory consumption and open file descriptors, to detect early signs of resource exhaustion. 4. Employ Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) capable of detecting and blocking suspicious connection patterns targeting the wildfly-http-client protocol. 5. Consider isolating or segmenting vulnerable services to limit exposure to untrusted networks. 6. Review and harden server configuration to minimize unnecessary HTTP upgrade usage or disable unused protocols if feasible. 7. Maintain an incident response plan to quickly recover from potential denial of service events caused by this vulnerability. 8. Engage with middleware vendors for guidance and support on secure configurations and updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-1635: Uncontrolled Resource Consumption
Description
A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available. At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree leaks via that task, which is added to XNIO WorkerThread. So, the workerThread points to the Undertow conduit, which contains the connections and causes the leak.
AI-Powered Analysis
Technical Analysis
CVE-2024-1635 is a vulnerability in Undertow 1.31.0 affecting servers that support the wildfly-http-client protocol. The issue arises during the HTTP upgrade to remoting, where the WriteTimeoutStreamSinkConduit component leaks connections if the RemotingConnection is closed by the Remoting ServerConnectionOpenListener. Specifically, the remoting connection, which originates as part of the HTTP upgrade, has an external layer that is unaware of the connection closure during the opening procedure. Consequently, the WriteTimeoutStreamSinkConduit is not notified of the closure and continues to maintain a timeout task referencing the connection. This timeout task is added to the XNIO WorkerThread, causing the entire dependency tree, including the connection objects, to leak. When a malicious user repeatedly opens and immediately closes connections on the HTTP port, these leaked resources accumulate, eventually exhausting both memory and file descriptor limits on the server. This uncontrolled resource consumption leads to denial of service by making the server unresponsive or crashing it. The vulnerability does not impact confidentiality or integrity but severely affects availability. It requires no authentication or user interaction, making exploitation straightforward over the network. The CVSS 3.1 score of 7.5 reflects its high severity, primarily due to the ease of exploitation and the significant impact on availability. No known exploits are currently reported in the wild, but the vulnerability poses a serious risk to affected deployments.
Potential Impact
For European organizations, the primary impact of CVE-2024-1635 is a denial of service condition caused by resource exhaustion on servers running Undertow 1.31.0, particularly those using WildFly or similar Java middleware stacks that leverage the wildfly-http-client protocol. This can disrupt critical business applications, web services, and middleware-dependent infrastructure, leading to downtime and potential loss of productivity. Industries relying heavily on Java EE middleware, such as finance, telecommunications, and government services, may experience service interruptions. The vulnerability's ease of exploitation means attackers can cause outages without needing credentials or user interaction, increasing the risk of opportunistic attacks or targeted disruption. Additionally, the exhaustion of file descriptors can prevent new connections, compounding service unavailability. While no data confidentiality or integrity loss is expected, the availability impact can affect compliance with service-level agreements and regulatory requirements for uptime and resilience. Organizations with exposed HTTP ports running the vulnerable Undertow version are particularly at risk.
Mitigation Recommendations
1. Apply patches or updates from the Undertow project or your middleware vendor as soon as they become available to address the connection leak issue. 2. In the interim, implement network-level rate limiting or connection throttling on HTTP ports to reduce the risk of rapid open/close connection attacks. 3. Monitor server resource usage closely, including memory consumption and open file descriptors, to detect early signs of resource exhaustion. 4. Employ Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) capable of detecting and blocking suspicious connection patterns targeting the wildfly-http-client protocol. 5. Consider isolating or segmenting vulnerable services to limit exposure to untrusted networks. 6. Review and harden server configuration to minimize unnecessary HTTP upgrade usage or disable unused protocols if feasible. 7. Maintain an incident response plan to quickly recover from potential denial of service events caused by this vulnerability. 8. Engage with middleware vendors for guidance and support on secure configurations and updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2024-02-19T17:25:58.418Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983ec4522896dcbefa69
Added to database: 5/21/2025, 9:09:18 AM
Last enriched: 11/14/2025, 11:01:00 AM
Last updated: 12/1/2025, 6:28:01 PM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13837: Vulnerability in Python Software Foundation CPython
LowCVE-2025-13836: Vulnerability in Python Software Foundation CPython
MediumCVE-2025-13653: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in floragunn Search Guard FLX
MediumCVE-2025-13835: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Tyche Softwares Arconix Shortcodes
MediumCVE-2025-65406: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.