Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30156: n/a

0
High
VulnerabilityCVE-2024-30156cvecve-2024-30156
Published: Sun Mar 24 2024 (03/24/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Varnish Cache before 7.3.2 and 7.4.x before 7.4.3 (and before 6.0.13 LTS), and Varnish Enterprise 6 before 6.0.12r6, allows credits exhaustion for an HTTP/2 connection control flow window, aka a Broke Window Attack.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 15:41:45 UTC

Technical Analysis

CVE-2024-30156 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) that affects Varnish Cache and Varnish Enterprise HTTP accelerators. The issue arises from improper management of the HTTP/2 connection control flow window credits, which are used to regulate the amount of data that can be sent before receiving further permission from the receiver. An attacker can exploit this by sending crafted HTTP/2 traffic that exhausts these credits, effectively blocking further legitimate data transmission on the connection. This results in a denial of service condition, as the server becomes unable to process additional HTTP/2 requests or responses on affected connections. The vulnerability impacts multiple versions of Varnish Cache prior to 7.3.2, 7.4.x prior to 7.4.3, and the 6.0.13 LTS release, as well as Varnish Enterprise 6 before 6.0.12r6. The CVSS v3.1 score of 7.5 reflects a high severity due to the network attack vector, lack of required privileges or user interaction, and the significant impact on availability. No confidentiality or integrity impact is noted. Although no public exploits have been reported yet, the nature of the vulnerability makes it a plausible target for denial of service attacks against web infrastructure relying on Varnish as a caching or reverse proxy layer.

Potential Impact

The primary impact of CVE-2024-30156 is denial of service, which can disrupt the availability of web services and applications relying on vulnerable Varnish Cache or Varnish Enterprise versions. Organizations using these products as HTTP accelerators or reverse proxies may experience degraded performance or complete service outages under attack. This can affect customer experience, lead to revenue loss, and damage organizational reputation. Since Varnish is widely used in content delivery networks, e-commerce platforms, and high-traffic websites, the scope of impact can be broad. The vulnerability does not compromise data confidentiality or integrity, but the availability disruption alone can have significant operational consequences, especially for organizations with critical web-facing infrastructure. The ease of exploitation without authentication and user interaction increases the risk of automated attacks targeting vulnerable deployments.

Mitigation Recommendations

1. Apply patches and updates as soon as they become available from Varnish Software to address this vulnerability. 2. In the interim, implement network-level rate limiting or connection throttling to reduce the risk of flow control window exhaustion attacks. 3. Consider disabling HTTP/2 support temporarily if feasible, or restrict HTTP/2 usage to trusted clients to limit exposure. 4. Monitor HTTP/2 connection metrics and logs for unusual patterns indicative of flow control abuse or resource exhaustion. 5. Deploy web application firewalls (WAFs) or intrusion prevention systems (IPS) with signatures or heuristics designed to detect and block abnormal HTTP/2 traffic patterns. 6. Conduct regular security assessments and stress testing to evaluate the resilience of Varnish deployments against denial of service scenarios. 7. Engage with Varnish support or security advisories for guidance on best practices and upcoming patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-24T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dbcb7ef31ef0b58d617

Added to database: 2/25/2026, 9:46:36 PM

Last enriched: 2/26/2026, 3:41:45 PM

Last updated: 4/12/2026, 7:53:39 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses