CVE-2024-24990: CWE-416 Use After Free in F5 NGINX Plus
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can cause NGINX worker processes to terminate. Note: The HTTP/3 QUIC module is not enabled by default and is considered experimental. For more information, refer to Support for QUIC and HTTP/3 https://nginx.org/en/docs/quic.html . Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
AI Analysis
Technical Summary
CVE-2024-24990 is a high-severity use-after-free vulnerability (CWE-416) affecting F5's NGINX Plus and NGINX OSS products when configured with the HTTP/3 QUIC module. This vulnerability arises because certain undisclosed HTTP/3 QUIC requests can trigger improper memory handling within NGINX worker processes, leading to their termination. The HTTP/3 QUIC module is experimental and not enabled by default, which somewhat limits the exposure surface. However, when enabled, this vulnerability can cause denial of service (DoS) conditions by crashing worker processes, thereby impacting the availability of the web services hosted behind NGINX. The affected versions include NGINX Plus releases R30 and R31. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). There are no known exploits in the wild at the time of publication, and no patches have been linked yet. Since the HTTP/3 QUIC module is experimental, this vulnerability may primarily affect early adopters or organizations testing HTTP/3 capabilities in production environments. The use-after-free condition could potentially be leveraged by attackers to cause repeated crashes, resulting in service disruption and denial of access to legitimate users.
Potential Impact
For European organizations, the primary impact of CVE-2024-24990 is on service availability. Organizations using NGINX Plus or NGINX OSS with the HTTP/3 QUIC module enabled may experience denial of service due to worker process crashes triggered by crafted HTTP/3 requests. This can disrupt critical web applications, customer-facing portals, or internal services relying on NGINX as a reverse proxy or load balancer. Given the increasing interest in HTTP/3 adoption for performance improvements, some European enterprises, especially in sectors like finance, telecommunications, and e-commerce, may be early adopters and thus at risk. The disruption could lead to operational downtime, loss of customer trust, and potential regulatory scrutiny under EU regulations such as GDPR if service interruptions affect data availability or processing. However, since the vulnerability does not impact confidentiality or integrity, risks related to data breaches are minimal. The lack of required privileges or user interaction means attackers can exploit this remotely and unauthenticated, increasing the threat level. Organizations with high availability requirements must consider this vulnerability seriously to avoid service degradation or outages.
Mitigation Recommendations
1. Disable the HTTP/3 QUIC module in NGINX Plus or NGINX OSS if it is not explicitly required, as it is experimental and not enabled by default. This eliminates the attack surface for this vulnerability. 2. For organizations requiring HTTP/3, monitor F5 and NGINX advisories closely for patches or updates addressing CVE-2024-24990 and apply them promptly once available. 3. Implement network-level protections such as rate limiting or filtering of HTTP/3 traffic to detect and block anomalous or malformed QUIC requests that could trigger the vulnerability. 4. Deploy robust monitoring and alerting on NGINX worker process health to detect crashes early and enable rapid incident response. 5. Consider isolating NGINX instances running HTTP/3 behind additional layers of security controls or within segmented network zones to limit potential impact. 6. Conduct thorough testing in staging environments before enabling HTTP/3 in production to evaluate stability and security posture. 7. Engage with F5 support or professional services for guidance on secure HTTP/3 deployment and vulnerability mitigation strategies.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Norway, Switzerland
CVE-2024-24990: CWE-416 Use After Free in F5 NGINX Plus
Description
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can cause NGINX worker processes to terminate. Note: The HTTP/3 QUIC module is not enabled by default and is considered experimental. For more information, refer to Support for QUIC and HTTP/3 https://nginx.org/en/docs/quic.html . Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
AI-Powered Analysis
Technical Analysis
CVE-2024-24990 is a high-severity use-after-free vulnerability (CWE-416) affecting F5's NGINX Plus and NGINX OSS products when configured with the HTTP/3 QUIC module. This vulnerability arises because certain undisclosed HTTP/3 QUIC requests can trigger improper memory handling within NGINX worker processes, leading to their termination. The HTTP/3 QUIC module is experimental and not enabled by default, which somewhat limits the exposure surface. However, when enabled, this vulnerability can cause denial of service (DoS) conditions by crashing worker processes, thereby impacting the availability of the web services hosted behind NGINX. The affected versions include NGINX Plus releases R30 and R31. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). There are no known exploits in the wild at the time of publication, and no patches have been linked yet. Since the HTTP/3 QUIC module is experimental, this vulnerability may primarily affect early adopters or organizations testing HTTP/3 capabilities in production environments. The use-after-free condition could potentially be leveraged by attackers to cause repeated crashes, resulting in service disruption and denial of access to legitimate users.
Potential Impact
For European organizations, the primary impact of CVE-2024-24990 is on service availability. Organizations using NGINX Plus or NGINX OSS with the HTTP/3 QUIC module enabled may experience denial of service due to worker process crashes triggered by crafted HTTP/3 requests. This can disrupt critical web applications, customer-facing portals, or internal services relying on NGINX as a reverse proxy or load balancer. Given the increasing interest in HTTP/3 adoption for performance improvements, some European enterprises, especially in sectors like finance, telecommunications, and e-commerce, may be early adopters and thus at risk. The disruption could lead to operational downtime, loss of customer trust, and potential regulatory scrutiny under EU regulations such as GDPR if service interruptions affect data availability or processing. However, since the vulnerability does not impact confidentiality or integrity, risks related to data breaches are minimal. The lack of required privileges or user interaction means attackers can exploit this remotely and unauthenticated, increasing the threat level. Organizations with high availability requirements must consider this vulnerability seriously to avoid service degradation or outages.
Mitigation Recommendations
1. Disable the HTTP/3 QUIC module in NGINX Plus or NGINX OSS if it is not explicitly required, as it is experimental and not enabled by default. This eliminates the attack surface for this vulnerability. 2. For organizations requiring HTTP/3, monitor F5 and NGINX advisories closely for patches or updates addressing CVE-2024-24990 and apply them promptly once available. 3. Implement network-level protections such as rate limiting or filtering of HTTP/3 traffic to detect and block anomalous or malformed QUIC requests that could trigger the vulnerability. 4. Deploy robust monitoring and alerting on NGINX worker process health to detect crashes early and enable rapid incident response. 5. Consider isolating NGINX instances running HTTP/3 behind additional layers of security controls or within segmented network zones to limit potential impact. 6. Conduct thorough testing in staging environments before enabling HTTP/3 in production to evaluate stability and security posture. 7. Engage with F5 support or professional services for guidance on secure HTTP/3 deployment and vulnerability mitigation strategies.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2024-02-02T00:32:55.375Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd8542
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 7/5/2025, 6:40:24 AM
Last updated: 8/14/2025, 12:15:56 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.