CVE-2024-25177: n/a
LuaJIT through 2.1 and OpenRusty luajit2 before v2.1-20240314 have an unsinking of IR_FSTORE for NULL metatable, which leads to Denial of Service (DoS).
AI Analysis
Technical Summary
CVE-2024-25177 is a vulnerability in LuaJIT, a Just-In-Time compiler for the Lua programming language widely used for performance-critical scripting in applications and embedded systems. The flaw arises from an unsinking of the IR_FSTORE instruction when handling a NULL metatable, a condition that leads to improper memory operations. This issue is classified under CWE-476 (NULL Pointer Dereference), which typically results in application crashes or system instability. The vulnerability affects LuaJIT through version 2.1 and OpenRusty luajit2 versions prior to v2.1-20240314. Exploitation requires no privileges or user interaction and can be triggered remotely if the LuaJIT engine processes crafted input or scripts. The consequence is a Denial of Service (DoS), where the affected application or system may crash or become unresponsive, impacting availability but not confidentiality or integrity. The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector, low complexity, no required privileges, and no user interaction. No public exploits have been reported yet, and no official patches are linked, though the fixed version is indicated. The vulnerability's root cause is related to the LuaJIT intermediate representation (IR) optimization phase mishandling NULL metatables, causing unsafe memory operations during JIT compilation or execution.
Potential Impact
For European organizations, the primary impact is disruption of services relying on LuaJIT for scripting or embedded logic. This includes web servers, network appliances, IoT devices, and software platforms that embed LuaJIT for performance. A successful DoS attack could lead to downtime, loss of availability, and potential cascading effects on dependent services. Critical infrastructure sectors such as telecommunications, manufacturing, and finance that use LuaJIT-based components may face operational interruptions. Additionally, organizations providing SaaS or cloud services with LuaJIT dependencies could experience degraded service quality or outages, impacting customer trust and regulatory compliance. Since exploitation requires no authentication and can be performed remotely, the attack surface is broad. However, the lack of known exploits in the wild currently reduces immediate risk but does not eliminate it. The vulnerability does not expose sensitive data or allow code execution, limiting impact to availability only.
Mitigation Recommendations
European organizations should monitor LuaJIT project updates and apply the fixed version v2.1-20240314 or later as soon as it becomes available. Until patches are applied, organizations should audit their software stacks to identify LuaJIT usage, including indirect dependencies. Employ runtime application self-protection (RASP) or memory safety tools to detect abnormal memory access patterns indicative of exploitation attempts. Network-level protections such as Web Application Firewalls (WAFs) can be tuned to detect and block suspicious Lua script payloads or malformed inputs targeting LuaJIT engines. For embedded systems, firmware updates incorporating patched LuaJIT versions should be prioritized. Additionally, implement robust monitoring and alerting for application crashes or unusual restarts that may signal exploitation attempts. Engage with vendors and suppliers to ensure timely patch deployment. Avoid exposing LuaJIT-powered services directly to untrusted networks without additional access controls.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-25177: n/a
Description
LuaJIT through 2.1 and OpenRusty luajit2 before v2.1-20240314 have an unsinking of IR_FSTORE for NULL metatable, which leads to Denial of Service (DoS).
AI-Powered Analysis
Technical Analysis
CVE-2024-25177 is a vulnerability in LuaJIT, a Just-In-Time compiler for the Lua programming language widely used for performance-critical scripting in applications and embedded systems. The flaw arises from an unsinking of the IR_FSTORE instruction when handling a NULL metatable, a condition that leads to improper memory operations. This issue is classified under CWE-476 (NULL Pointer Dereference), which typically results in application crashes or system instability. The vulnerability affects LuaJIT through version 2.1 and OpenRusty luajit2 versions prior to v2.1-20240314. Exploitation requires no privileges or user interaction and can be triggered remotely if the LuaJIT engine processes crafted input or scripts. The consequence is a Denial of Service (DoS), where the affected application or system may crash or become unresponsive, impacting availability but not confidentiality or integrity. The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector, low complexity, no required privileges, and no user interaction. No public exploits have been reported yet, and no official patches are linked, though the fixed version is indicated. The vulnerability's root cause is related to the LuaJIT intermediate representation (IR) optimization phase mishandling NULL metatables, causing unsafe memory operations during JIT compilation or execution.
Potential Impact
For European organizations, the primary impact is disruption of services relying on LuaJIT for scripting or embedded logic. This includes web servers, network appliances, IoT devices, and software platforms that embed LuaJIT for performance. A successful DoS attack could lead to downtime, loss of availability, and potential cascading effects on dependent services. Critical infrastructure sectors such as telecommunications, manufacturing, and finance that use LuaJIT-based components may face operational interruptions. Additionally, organizations providing SaaS or cloud services with LuaJIT dependencies could experience degraded service quality or outages, impacting customer trust and regulatory compliance. Since exploitation requires no authentication and can be performed remotely, the attack surface is broad. However, the lack of known exploits in the wild currently reduces immediate risk but does not eliminate it. The vulnerability does not expose sensitive data or allow code execution, limiting impact to availability only.
Mitigation Recommendations
European organizations should monitor LuaJIT project updates and apply the fixed version v2.1-20240314 or later as soon as it becomes available. Until patches are applied, organizations should audit their software stacks to identify LuaJIT usage, including indirect dependencies. Employ runtime application self-protection (RASP) or memory safety tools to detect abnormal memory access patterns indicative of exploitation attempts. Network-level protections such as Web Application Firewalls (WAFs) can be tuned to detect and block suspicious Lua script payloads or malformed inputs targeting LuaJIT engines. For embedded systems, firmware updates incorporating patched LuaJIT versions should be prioritized. Additionally, implement robust monitoring and alerting for application crashes or unusual restarts that may signal exploitation attempts. Engage with vendors and suppliers to ensure timely patch deployment. Avoid exposing LuaJIT-powered services directly to untrusted networks without additional access controls.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2024-02-07T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6908f50bf612d110fe9cbe8c
Added to database: 11/3/2025, 6:31:39 PM
Last enriched: 11/3/2025, 6:46:57 PM
Last updated: 11/4/2025, 2:11:08 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12682: CWE-434 Unrestricted Upload of File with Dangerous Type in fahadmahmood Easy Upload Files During Checkout
CriticalCVE-2025-41345: CWE-862 Missing Authorization in CanalDenuncia CanalDenuncia.app
HighCVE-2025-41344: CWE-862 Missing Authorization in CanalDenuncia CanalDenuncia.app
HighCVE-2025-41343: CWE-862 Missing Authorization in CanalDenuncia CanalDenuncia.app
HighCVE-2025-41342: CWE-862 Missing Authorization in CanalDenuncia CanalDenuncia.app
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.