Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25111: CWE-674: Uncontrolled Recursion in squid-cache squid

0
High
VulnerabilityCVE-2024-25111cvecve-2024-25111cwe-674
Published: Wed Mar 06 2024 (03/06/2024, 18:14:28 UTC)
Source: CVE Database V5
Vendor/Project: squid-cache
Product: squid

Description

Squid is a web proxy cache. Starting in version 3.5.27 and prior to version 6.8, Squid may be vulnerable to a Denial of Service attack against HTTP Chunked decoder due to an uncontrolled recursion bug. This problem allows a remote attacker to cause Denial of Service when sending a crafted, chunked, encoded HTTP Message. This bug is fixed in Squid version 6.8. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. There is no workaround for this issue.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:11:30 UTC

Technical Analysis

CVE-2024-25111 is a vulnerability classified under CWE-674 (Uncontrolled Recursion) affecting the Squid web proxy cache software versions starting from 3.5.27 up to but excluding 6.8. The flaw resides in the HTTP Chunked decoder component, where improper handling of chunked-encoded HTTP messages leads to uncontrolled recursion. This recursion can be triggered remotely by an attacker sending a crafted chunked HTTP request, causing the Squid process to consume excessive stack or memory resources, ultimately resulting in a Denial of Service (DoS) condition. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The impact is limited to availability, as the attacker cannot compromise confidentiality or integrity of data. The issue was publicly disclosed on March 6, 2024, with a CVSS v3.1 base score of 8.6, indicating high severity. The fix is included in Squid version 6.8, and patches for stable releases are available in Squid's patch archives. No known exploits are currently reported in the wild. Due to the lack of a workaround, affected organizations must apply patches promptly to mitigate risk. Squid is widely used in enterprise and ISP environments for caching and proxying HTTP traffic, making this vulnerability relevant to many network infrastructures.

Potential Impact

For European organizations, the primary impact of CVE-2024-25111 is the potential disruption of web proxy services that rely on Squid. This can lead to degraded network performance, loss of caching benefits, and interruption of HTTP traffic filtering or access controls, affecting business continuity and user productivity. Organizations using Squid as part of their security stack or content delivery infrastructure may experience outages or degraded service availability. Critical sectors such as telecommunications, financial services, government agencies, and large enterprises that depend on Squid proxies for traffic management are particularly at risk. The vulnerability does not expose sensitive data or allow code execution, but the resulting DoS can be leveraged as part of a broader attack strategy to disrupt operations. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially given the ease of exploitation and public disclosure. Failure to patch may also increase exposure to automated scanning and exploitation attempts in the near future.

Mitigation Recommendations

European organizations should prioritize upgrading Squid installations to version 6.8 or later, where the vulnerability is fully resolved. For environments unable to upgrade immediately, applying the official patches available in Squid's patch archives for stable releases is essential. Network administrators should implement monitoring and alerting for anomalous HTTP chunked transfer-encoded traffic patterns that may indicate exploitation attempts. Deploying rate limiting or filtering on HTTP chunked requests at perimeter devices can reduce exposure. Additionally, organizations should review proxy usage policies to limit exposure to untrusted sources and segment proxy servers to contain potential DoS impacts. Regular vulnerability scanning and asset inventory updates will help identify all affected Squid instances. Incident response plans should be updated to address potential DoS scenarios involving proxy infrastructure. Finally, maintaining up-to-date backups and redundancy for critical proxy services will aid in rapid recovery if disruption occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2024-02-05T14:14:46.378Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092148fe7723195e0543fa

Added to database: 11/3/2025, 9:40:24 PM

Last enriched: 11/3/2025, 10:11:30 PM

Last updated: 11/5/2025, 2:00:04 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats