Skip to main content

CVE-2024-24990: CWE-416 Use After Free in F5 NGINX Plus

High
VulnerabilityCVE-2024-24990cvecve-2024-24990cwe-416
Published: Wed Feb 14 2024 (02/14/2024, 16:30:26 UTC)
Source: CVE
Vendor/Project: F5
Product: NGINX Plus

Description

When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests can cause NGINX worker processes to terminate. Note: The HTTP/3 QUIC module is not enabled by default and is considered experimental. For more information, refer to Support for QUIC and HTTP/3 https://nginx.org/en/docs/quic.html . Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

AI-Powered Analysis

AILast updated: 07/05/2025, 06:40:24 UTC

Technical Analysis

CVE-2024-24990 is a high-severity use-after-free vulnerability (CWE-416) affecting F5's NGINX Plus and NGINX OSS products when configured with the HTTP/3 QUIC module. This vulnerability arises because certain undisclosed HTTP/3 QUIC requests can trigger improper memory handling within NGINX worker processes, leading to their termination. The HTTP/3 QUIC module is experimental and not enabled by default, which somewhat limits the exposure surface. However, when enabled, this vulnerability can cause denial of service (DoS) conditions by crashing worker processes, thereby impacting the availability of the web services hosted behind NGINX. The affected versions include NGINX Plus releases R30 and R31. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). There are no known exploits in the wild at the time of publication, and no patches have been linked yet. Since the HTTP/3 QUIC module is experimental, this vulnerability may primarily affect early adopters or organizations testing HTTP/3 capabilities in production environments. The use-after-free condition could potentially be leveraged by attackers to cause repeated crashes, resulting in service disruption and denial of access to legitimate users.

Potential Impact

For European organizations, the primary impact of CVE-2024-24990 is on service availability. Organizations using NGINX Plus or NGINX OSS with the HTTP/3 QUIC module enabled may experience denial of service due to worker process crashes triggered by crafted HTTP/3 requests. This can disrupt critical web applications, customer-facing portals, or internal services relying on NGINX as a reverse proxy or load balancer. Given the increasing interest in HTTP/3 adoption for performance improvements, some European enterprises, especially in sectors like finance, telecommunications, and e-commerce, may be early adopters and thus at risk. The disruption could lead to operational downtime, loss of customer trust, and potential regulatory scrutiny under EU regulations such as GDPR if service interruptions affect data availability or processing. However, since the vulnerability does not impact confidentiality or integrity, risks related to data breaches are minimal. The lack of required privileges or user interaction means attackers can exploit this remotely and unauthenticated, increasing the threat level. Organizations with high availability requirements must consider this vulnerability seriously to avoid service degradation or outages.

Mitigation Recommendations

1. Disable the HTTP/3 QUIC module in NGINX Plus or NGINX OSS if it is not explicitly required, as it is experimental and not enabled by default. This eliminates the attack surface for this vulnerability. 2. For organizations requiring HTTP/3, monitor F5 and NGINX advisories closely for patches or updates addressing CVE-2024-24990 and apply them promptly once available. 3. Implement network-level protections such as rate limiting or filtering of HTTP/3 traffic to detect and block anomalous or malformed QUIC requests that could trigger the vulnerability. 4. Deploy robust monitoring and alerting on NGINX worker process health to detect crashes early and enable rapid incident response. 5. Consider isolating NGINX instances running HTTP/3 behind additional layers of security controls or within segmented network zones to limit potential impact. 6. Conduct thorough testing in staging environments before enabling HTTP/3 in production to evaluate stability and security posture. 7. Engage with F5 support or professional services for guidance on secure HTTP/3 deployment and vulnerability mitigation strategies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2024-02-02T00:32:55.375Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8542

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 6:40:24 AM

Last updated: 8/14/2025, 12:15:56 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats