CVE-2024-24989: CWE-476 NULL Pointer Dereference in F5 NGINX Plus
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can cause NGINX worker processes to terminate. Note: The HTTP/3 QUIC module is not enabled by default and is considered experimental. For more information, refer to Support for QUIC and HTTP/3 https://nginx.org/en/docs/quic.html . NOTE: Software versions which have reached End of Technical Support (EoTS) are not evaluated
AI Analysis
Technical Summary
CVE-2024-24989 is a high-severity vulnerability identified in F5's NGINX Plus product, specifically affecting version R31 when configured to use the HTTP/3 QUIC module. The vulnerability is classified as CWE-476, which corresponds to a NULL Pointer Dereference. This type of flaw occurs when the software attempts to access or dereference a pointer that has a NULL value, leading to unexpected behavior such as application crashes. In this case, certain undisclosed HTTP/3 QUIC requests can cause the NGINX worker processes to terminate unexpectedly. Since NGINX worker processes handle incoming client requests, their termination results in denial of service conditions, impacting availability. It is important to note that the HTTP/3 QUIC module is experimental and not enabled by default, which somewhat limits the exposure surface. The vulnerability does not affect confidentiality or integrity directly but impacts availability by causing service interruptions. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector, no required privileges, no user interaction, and a direct impact on availability. No known exploits are currently reported in the wild, and no patches have been linked yet. Additionally, versions that have reached End of Technical Support are not evaluated, focusing the concern on supported releases. This vulnerability highlights the risks associated with enabling experimental protocol modules in production environments without thorough security validation.
Potential Impact
For European organizations, the primary impact of CVE-2024-24989 is the potential for denial of service (DoS) attacks against web infrastructure running NGINX Plus with the HTTP/3 QUIC module enabled. Organizations relying on NGINX Plus for critical web services, especially those experimenting with or adopting HTTP/3, may experience service outages if attackers send crafted requests triggering the NULL pointer dereference. This can disrupt business operations, degrade user experience, and potentially lead to financial losses or reputational damage. Since HTTP/3 adoption is growing in Europe due to its performance benefits, especially among cloud providers, telecom operators, and large enterprises, the risk is relevant for sectors such as finance, e-commerce, government, and telecommunications. However, the impact is somewhat mitigated by the fact that the vulnerable module is not enabled by default and is experimental, meaning many deployments may not be exposed. Still, organizations enabling HTTP/3 QUIC should consider this vulnerability seriously, as an attacker can exploit it remotely without authentication or user interaction, increasing the attack surface.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Immediately audit NGINX Plus deployments to identify if the HTTP/3 QUIC module is enabled, especially on version R31. 2) If HTTP/3 QUIC is not required, disable the module to eliminate exposure. 3) For deployments requiring HTTP/3, monitor F5 and NGINX security advisories closely for patches or updates addressing CVE-2024-24989 and apply them promptly once available. 4) Implement network-level protections such as rate limiting and anomaly detection on HTTP/3 traffic to detect and block suspicious or malformed requests that could trigger the vulnerability. 5) Employ redundancy and failover mechanisms in web infrastructure to minimize service disruption if worker processes terminate unexpectedly. 6) Conduct thorough testing of experimental protocol features in isolated environments before production rollout. 7) Engage with F5 support for guidance on temporary workarounds or configuration changes that may mitigate the issue until patches are released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Italy, Spain
CVE-2024-24989: CWE-476 NULL Pointer Dereference in F5 NGINX Plus
Description
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can cause NGINX worker processes to terminate. Note: The HTTP/3 QUIC module is not enabled by default and is considered experimental. For more information, refer to Support for QUIC and HTTP/3 https://nginx.org/en/docs/quic.html . NOTE: Software versions which have reached End of Technical Support (EoTS) are not evaluated
AI-Powered Analysis
Technical Analysis
CVE-2024-24989 is a high-severity vulnerability identified in F5's NGINX Plus product, specifically affecting version R31 when configured to use the HTTP/3 QUIC module. The vulnerability is classified as CWE-476, which corresponds to a NULL Pointer Dereference. This type of flaw occurs when the software attempts to access or dereference a pointer that has a NULL value, leading to unexpected behavior such as application crashes. In this case, certain undisclosed HTTP/3 QUIC requests can cause the NGINX worker processes to terminate unexpectedly. Since NGINX worker processes handle incoming client requests, their termination results in denial of service conditions, impacting availability. It is important to note that the HTTP/3 QUIC module is experimental and not enabled by default, which somewhat limits the exposure surface. The vulnerability does not affect confidentiality or integrity directly but impacts availability by causing service interruptions. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector, no required privileges, no user interaction, and a direct impact on availability. No known exploits are currently reported in the wild, and no patches have been linked yet. Additionally, versions that have reached End of Technical Support are not evaluated, focusing the concern on supported releases. This vulnerability highlights the risks associated with enabling experimental protocol modules in production environments without thorough security validation.
Potential Impact
For European organizations, the primary impact of CVE-2024-24989 is the potential for denial of service (DoS) attacks against web infrastructure running NGINX Plus with the HTTP/3 QUIC module enabled. Organizations relying on NGINX Plus for critical web services, especially those experimenting with or adopting HTTP/3, may experience service outages if attackers send crafted requests triggering the NULL pointer dereference. This can disrupt business operations, degrade user experience, and potentially lead to financial losses or reputational damage. Since HTTP/3 adoption is growing in Europe due to its performance benefits, especially among cloud providers, telecom operators, and large enterprises, the risk is relevant for sectors such as finance, e-commerce, government, and telecommunications. However, the impact is somewhat mitigated by the fact that the vulnerable module is not enabled by default and is experimental, meaning many deployments may not be exposed. Still, organizations enabling HTTP/3 QUIC should consider this vulnerability seriously, as an attacker can exploit it remotely without authentication or user interaction, increasing the attack surface.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Immediately audit NGINX Plus deployments to identify if the HTTP/3 QUIC module is enabled, especially on version R31. 2) If HTTP/3 QUIC is not required, disable the module to eliminate exposure. 3) For deployments requiring HTTP/3, monitor F5 and NGINX security advisories closely for patches or updates addressing CVE-2024-24989 and apply them promptly once available. 4) Implement network-level protections such as rate limiting and anomaly detection on HTTP/3 traffic to detect and block suspicious or malformed requests that could trigger the vulnerability. 5) Employ redundancy and failover mechanisms in web infrastructure to minimize service disruption if worker processes terminate unexpectedly. 6) Conduct thorough testing of experimental protocol features in isolated environments before production rollout. 7) Engage with F5 support for guidance on temporary workarounds or configuration changes that may mitigate the issue until patches are released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2024-02-02T00:32:55.375Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6dd9
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/4/2025, 9:58:54 PM
Last updated: 8/13/2025, 9:42:32 PM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.