Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23722: n/a

0
High
VulnerabilityCVE-2024-23722cvecve-2024-23722
Published: Tue Mar 26 2024 (03/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In Fluent Bit 2.1.8 through 2.2.1, a NULL pointer dereference can be caused via an invalid HTTP payload with the content type of x-www-form-urlencoded. It crashes and does not restart. This could result in logs not being delivered properly.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:15:23 UTC

Technical Analysis

CVE-2024-23722 affects Fluent Bit, a widely used open-source log processor and forwarder, specifically versions 2.1.8 through 2.2.1. The vulnerability arises when Fluent Bit processes an HTTP request with an invalid payload of content type x-www-form-urlencoded, leading to a NULL pointer dereference. This dereference causes the Fluent Bit process to crash and, critically, it does not automatically restart, resulting in a denial of service condition where logs are not forwarded or delivered. The vulnerability is remotely exploitable without any authentication or user interaction, making it accessible to attackers who can send crafted HTTP requests to affected Fluent Bit instances. The flaw is identified as CWE-476, indicating improper handling of NULL pointers in the codebase. Although no active exploitation has been reported, the potential for disruption in logging infrastructure is high, especially in environments where Fluent Bit is deployed as a critical component for log collection and forwarding. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed, with impact focused on availability. No official patches or updates are linked yet, so mitigation relies on workarounds or configuration changes until a fix is released.

Potential Impact

The primary impact of CVE-2024-23722 is on the availability of logging services. Fluent Bit crashing and failing to restart leads to loss of log data, which can severely impair an organization's ability to monitor, audit, and respond to security incidents or operational issues. This can hinder incident detection and forensic investigations, increasing risk exposure. Organizations using Fluent Bit in critical environments such as cloud infrastructure, container orchestration platforms (e.g., Kubernetes), or centralized logging systems may experience significant operational disruptions. The denial of service could be exploited by attackers to blind security monitoring systems, facilitating further attacks or data breaches. Since the vulnerability requires no authentication and can be triggered remotely, it poses a risk to any exposed Fluent Bit endpoints. The lack of automatic recovery exacerbates the impact, requiring manual intervention to restore logging functionality.

Mitigation Recommendations

1. Immediately monitor Fluent Bit instances for crashes and failures to restart, implementing alerting to detect this condition quickly. 2. Restrict network access to Fluent Bit HTTP endpoints to trusted sources only, using firewall rules or network segmentation to reduce exposure. 3. If possible, disable or limit processing of HTTP payloads with content type x-www-form-urlencoded until a patch is available. 4. Implement process supervision or orchestration tools (e.g., systemd, Kubernetes liveness probes) to automatically restart Fluent Bit upon crashes to minimize downtime. 5. Review Fluent Bit configurations to ensure minimal exposure of HTTP input plugins or endpoints. 6. Stay updated with Fluent Bit vendor announcements and apply patches promptly once released. 7. Consider deploying additional logging redundancy or alternative log forwarders temporarily to maintain log continuity. 8. Conduct internal testing with malformed HTTP payloads in a controlled environment to understand the impact and validate mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d51b7ef31ef0b5704ec

Added to database: 2/25/2026, 9:44:49 PM

Last enriched: 2/26/2026, 10:15:23 AM

Last updated: 4/12/2026, 2:00:23 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses