CVE-2024-25111: CWE-674: Uncontrolled Recursion in squid-cache squid
Squid is a web proxy cache. Starting in version 3.5.27 and prior to version 6.8, Squid may be vulnerable to a Denial of Service attack against HTTP Chunked decoder due to an uncontrolled recursion bug. This problem allows a remote attacker to cause Denial of Service when sending a crafted, chunked, encoded HTTP Message. This bug is fixed in Squid version 6.8. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. There is no workaround for this issue.
AI Analysis
Technical Summary
CVE-2024-25111 is a vulnerability classified under CWE-674 (Uncontrolled Recursion) affecting the Squid web proxy cache software versions starting from 3.5.27 up to but excluding 6.8. The flaw resides in the HTTP Chunked decoder component, where improper handling of chunked-encoded HTTP messages leads to uncontrolled recursion. This recursion can be triggered remotely by an attacker sending a crafted chunked HTTP request, causing the Squid process to consume excessive stack or memory resources, ultimately resulting in a Denial of Service (DoS) condition. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The impact is limited to availability, as the attacker cannot compromise confidentiality or integrity of data. The issue was publicly disclosed on March 6, 2024, with a CVSS v3.1 base score of 8.6, indicating high severity. The fix is included in Squid version 6.8, and patches for stable releases are available in Squid's patch archives. No known exploits are currently reported in the wild. Due to the lack of a workaround, affected organizations must apply patches promptly to mitigate risk. Squid is widely used in enterprise and ISP environments for caching and proxying HTTP traffic, making this vulnerability relevant to many network infrastructures.
Potential Impact
For European organizations, the primary impact of CVE-2024-25111 is the potential disruption of web proxy services that rely on Squid. This can lead to degraded network performance, loss of caching benefits, and interruption of HTTP traffic filtering or access controls, affecting business continuity and user productivity. Organizations using Squid as part of their security stack or content delivery infrastructure may experience outages or degraded service availability. Critical sectors such as telecommunications, financial services, government agencies, and large enterprises that depend on Squid proxies for traffic management are particularly at risk. The vulnerability does not expose sensitive data or allow code execution, but the resulting DoS can be leveraged as part of a broader attack strategy to disrupt operations. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially given the ease of exploitation and public disclosure. Failure to patch may also increase exposure to automated scanning and exploitation attempts in the near future.
Mitigation Recommendations
European organizations should prioritize upgrading Squid installations to version 6.8 or later, where the vulnerability is fully resolved. For environments unable to upgrade immediately, applying the official patches available in Squid's patch archives for stable releases is essential. Network administrators should implement monitoring and alerting for anomalous HTTP chunked transfer-encoded traffic patterns that may indicate exploitation attempts. Deploying rate limiting or filtering on HTTP chunked requests at perimeter devices can reduce exposure. Additionally, organizations should review proxy usage policies to limit exposure to untrusted sources and segment proxy servers to contain potential DoS impacts. Regular vulnerability scanning and asset inventory updates will help identify all affected Squid instances. Incident response plans should be updated to address potential DoS scenarios involving proxy infrastructure. Finally, maintaining up-to-date backups and redundancy for critical proxy services will aid in rapid recovery if disruption occurs.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2024-25111: CWE-674: Uncontrolled Recursion in squid-cache squid
Description
Squid is a web proxy cache. Starting in version 3.5.27 and prior to version 6.8, Squid may be vulnerable to a Denial of Service attack against HTTP Chunked decoder due to an uncontrolled recursion bug. This problem allows a remote attacker to cause Denial of Service when sending a crafted, chunked, encoded HTTP Message. This bug is fixed in Squid version 6.8. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. There is no workaround for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2024-25111 is a vulnerability classified under CWE-674 (Uncontrolled Recursion) affecting the Squid web proxy cache software versions starting from 3.5.27 up to but excluding 6.8. The flaw resides in the HTTP Chunked decoder component, where improper handling of chunked-encoded HTTP messages leads to uncontrolled recursion. This recursion can be triggered remotely by an attacker sending a crafted chunked HTTP request, causing the Squid process to consume excessive stack or memory resources, ultimately resulting in a Denial of Service (DoS) condition. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The impact is limited to availability, as the attacker cannot compromise confidentiality or integrity of data. The issue was publicly disclosed on March 6, 2024, with a CVSS v3.1 base score of 8.6, indicating high severity. The fix is included in Squid version 6.8, and patches for stable releases are available in Squid's patch archives. No known exploits are currently reported in the wild. Due to the lack of a workaround, affected organizations must apply patches promptly to mitigate risk. Squid is widely used in enterprise and ISP environments for caching and proxying HTTP traffic, making this vulnerability relevant to many network infrastructures.
Potential Impact
For European organizations, the primary impact of CVE-2024-25111 is the potential disruption of web proxy services that rely on Squid. This can lead to degraded network performance, loss of caching benefits, and interruption of HTTP traffic filtering or access controls, affecting business continuity and user productivity. Organizations using Squid as part of their security stack or content delivery infrastructure may experience outages or degraded service availability. Critical sectors such as telecommunications, financial services, government agencies, and large enterprises that depend on Squid proxies for traffic management are particularly at risk. The vulnerability does not expose sensitive data or allow code execution, but the resulting DoS can be leveraged as part of a broader attack strategy to disrupt operations. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially given the ease of exploitation and public disclosure. Failure to patch may also increase exposure to automated scanning and exploitation attempts in the near future.
Mitigation Recommendations
European organizations should prioritize upgrading Squid installations to version 6.8 or later, where the vulnerability is fully resolved. For environments unable to upgrade immediately, applying the official patches available in Squid's patch archives for stable releases is essential. Network administrators should implement monitoring and alerting for anomalous HTTP chunked transfer-encoded traffic patterns that may indicate exploitation attempts. Deploying rate limiting or filtering on HTTP chunked requests at perimeter devices can reduce exposure. Additionally, organizations should review proxy usage policies to limit exposure to untrusted sources and segment proxy servers to contain potential DoS impacts. Regular vulnerability scanning and asset inventory updates will help identify all affected Squid instances. Incident response plans should be updated to address potential DoS scenarios involving proxy infrastructure. Finally, maintaining up-to-date backups and redundancy for critical proxy services will aid in rapid recovery if disruption occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2024-02-05T14:14:46.378Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69092148fe7723195e0543fa
Added to database: 11/3/2025, 9:40:24 PM
Last enriched: 11/3/2025, 10:11:30 PM
Last updated: 11/5/2025, 2:00:04 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumCVE-2025-58337: CWE-284 Improper Access Control in Apache Software Foundation Apache Doris-MCP-Server
UnknownCVE-2025-12469: CWE-862 Missing Authorization in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumCVE-2025-12468: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.