Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25178: n/a

0
Critical
VulnerabilityCVE-2024-25178cvecve-2024-25178
Published: Mon Jul 07 2025 (07/07/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

LuaJIT through 2.1 and OpenRusty luajit2 before v2.1-20240314 have an out-of-bounds read in the stack-overflow handler in lj_state.c.

AI-Powered Analysis

AILast updated: 11/03/2025, 18:46:44 UTC

Technical Analysis

CVE-2024-25178 is a critical vulnerability identified in LuaJIT, a Just-In-Time compiler for the Lua programming language widely used to enhance performance in embedded scripting environments. The flaw exists in the stack-overflow handler implemented in lj_state.c, where an out-of-bounds read can occur when the stack overflow condition is triggered. This vulnerability is classified under CWE-125 (Out-of-bounds Read), and it affects all versions of LuaJIT through 2.1 and OpenRusty luajit2 versions prior to v2.1-20240314. The vulnerability allows an unauthenticated attacker to remotely trigger the flaw over the network without any user interaction, leading to a denial-of-service (DoS) condition by crashing the affected process or system component. The CVSS v3.1 base score of 9.1 reflects the critical nature of this vulnerability due to its network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and high availability impact (A:H). Although no public exploits have been reported yet, the ease of exploitation and the critical impact on availability make this a high-priority issue. LuaJIT is embedded in numerous applications and platforms, including network appliances, game engines, and IoT devices, which broadens the attack surface. The lack of available patches at the time of disclosure necessitates immediate risk mitigation strategies to reduce exposure until fixes are released.

Potential Impact

The primary impact of CVE-2024-25178 is a denial-of-service condition caused by out-of-bounds reads in the stack-overflow handler, which can crash applications or systems embedding LuaJIT. For European organizations, this can disrupt critical services, especially those relying on LuaJIT for scripting in network devices, industrial control systems, or software platforms. The high confidentiality impact rating suggests potential information leakage risks, although no integrity impact is noted. The vulnerability's network accessibility and lack of required privileges increase the risk of widespread exploitation. Disruptions could affect sectors such as telecommunications, manufacturing, finance, and government services that utilize LuaJIT-based components. The absence of known exploits currently provides a window for proactive mitigation, but the critical severity demands urgent attention to prevent potential future attacks. Additionally, the impact on availability could lead to operational downtime, financial losses, and reputational damage for affected organizations.

Mitigation Recommendations

1. Immediately inventory all systems and applications using LuaJIT or OpenRusty luajit2 to identify vulnerable versions. 2. Restrict network access to services and applications embedding LuaJIT, especially those exposed to untrusted networks, using firewalls and network segmentation. 3. Implement application-level monitoring and alerting for crashes or abnormal behavior indicative of exploitation attempts. 4. Employ runtime protection mechanisms such as sandboxing or containerization to limit the impact of potential crashes. 5. Coordinate with software vendors and open-source communities to obtain and apply patches or updated LuaJIT versions as soon as they become available. 6. Consider temporary workarounds such as disabling LuaJIT scripting features if feasible without impacting critical functionality. 7. Conduct penetration testing and vulnerability scanning focused on LuaJIT components to validate the effectiveness of mitigations. 8. Educate development and operations teams about the vulnerability to ensure rapid response and patch management. 9. Maintain up-to-date backups and incident response plans to recover quickly from potential denial-of-service attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6908f50bf612d110fe9cbe93

Added to database: 11/3/2025, 6:31:39 PM

Last enriched: 11/3/2025, 6:46:44 PM

Last updated: 11/3/2025, 8:37:28 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats