Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25177: n/a

0
High
VulnerabilityCVE-2024-25177cvecve-2024-25177
Published: Mon Jul 07 2025 (07/07/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

LuaJIT through 2.1 and OpenRusty luajit2 before v2.1-20240314 have an unsinking of IR_FSTORE for NULL metatable, which leads to Denial of Service (DoS).

AI-Powered Analysis

AILast updated: 11/03/2025, 18:46:57 UTC

Technical Analysis

CVE-2024-25177 is a vulnerability in LuaJIT, a Just-In-Time compiler for the Lua programming language widely used for performance-critical scripting in applications and embedded systems. The flaw arises from an unsinking of the IR_FSTORE instruction when handling a NULL metatable, a condition that leads to improper memory operations. This issue is classified under CWE-476 (NULL Pointer Dereference), which typically results in application crashes or system instability. The vulnerability affects LuaJIT through version 2.1 and OpenRusty luajit2 versions prior to v2.1-20240314. Exploitation requires no privileges or user interaction and can be triggered remotely if the LuaJIT engine processes crafted input or scripts. The consequence is a Denial of Service (DoS), where the affected application or system may crash or become unresponsive, impacting availability but not confidentiality or integrity. The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector, low complexity, no required privileges, and no user interaction. No public exploits have been reported yet, and no official patches are linked, though the fixed version is indicated. The vulnerability's root cause is related to the LuaJIT intermediate representation (IR) optimization phase mishandling NULL metatables, causing unsafe memory operations during JIT compilation or execution.

Potential Impact

For European organizations, the primary impact is disruption of services relying on LuaJIT for scripting or embedded logic. This includes web servers, network appliances, IoT devices, and software platforms that embed LuaJIT for performance. A successful DoS attack could lead to downtime, loss of availability, and potential cascading effects on dependent services. Critical infrastructure sectors such as telecommunications, manufacturing, and finance that use LuaJIT-based components may face operational interruptions. Additionally, organizations providing SaaS or cloud services with LuaJIT dependencies could experience degraded service quality or outages, impacting customer trust and regulatory compliance. Since exploitation requires no authentication and can be performed remotely, the attack surface is broad. However, the lack of known exploits in the wild currently reduces immediate risk but does not eliminate it. The vulnerability does not expose sensitive data or allow code execution, limiting impact to availability only.

Mitigation Recommendations

European organizations should monitor LuaJIT project updates and apply the fixed version v2.1-20240314 or later as soon as it becomes available. Until patches are applied, organizations should audit their software stacks to identify LuaJIT usage, including indirect dependencies. Employ runtime application self-protection (RASP) or memory safety tools to detect abnormal memory access patterns indicative of exploitation attempts. Network-level protections such as Web Application Firewalls (WAFs) can be tuned to detect and block suspicious Lua script payloads or malformed inputs targeting LuaJIT engines. For embedded systems, firmware updates incorporating patched LuaJIT versions should be prioritized. Additionally, implement robust monitoring and alerting for application crashes or unusual restarts that may signal exploitation attempts. Engage with vendors and suppliers to ensure timely patch deployment. Avoid exposing LuaJIT-powered services directly to untrusted networks without additional access controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6908f50bf612d110fe9cbe8c

Added to database: 11/3/2025, 6:31:39 PM

Last enriched: 11/3/2025, 6:46:57 PM

Last updated: 11/4/2025, 2:11:08 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats