Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39249: n/a

0
High
VulnerabilityCVE-2024-39249cvecve-2024-39249
Published: Mon Jul 01 2024 (07/01/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Async <= 2.6.4 and <= 3.2.5 are vulnerable to ReDoS (Regular Expression Denial of Service) while parsing function in autoinject function. NOTE: this is disputed by the supplier because there is no realistic threat model: regular expressions are not used with untrusted input.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:21:15 UTC

Technical Analysis

CVE-2024-39249 identifies a Regular Expression Denial of Service (ReDoS) vulnerability in the Async library versions up to 2.6.4 and 3.2.5, specifically within the autoinject function's parsing mechanism. The vulnerability arises from the use of inefficient regular expressions that, when processing specially crafted input, can cause excessive backtracking, resulting in significant CPU resource consumption and service unavailability. This type of attack exploits the algorithmic complexity of certain regex patterns, causing the system to hang or crash under load. The supplier disputes the severity, arguing that the vulnerable regexes are not intended to process untrusted input, thus limiting realistic exploitation scenarios. However, if an attacker can supply input to the vulnerable function, the system could be rendered unresponsive remotely without requiring authentication or user interaction. The CVSS 3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) reflects a high impact on availability with a low attack complexity and no privileges or user interaction needed. No patches or fixes have been published yet, and no known exploits have been observed in the wild. The vulnerability is categorized under CWE-1333, which relates to ReDoS issues caused by vulnerable regular expressions.

Potential Impact

The primary impact of CVE-2024-39249 is on the availability of systems using the affected Async library versions. Successful exploitation can cause denial of service by exhausting CPU resources through maliciously crafted input that triggers excessive regex backtracking. This can lead to service outages, degraded performance, and potential cascading failures in dependent systems. Organizations relying on Async in critical infrastructure, web services, or backend processing pipelines may experience downtime or degraded user experience. Although confidentiality and integrity are not directly affected, the availability disruption can have significant operational and reputational consequences. The lack of authentication or user interaction requirements increases the risk of remote exploitation. Since no known exploits are currently active, the threat is theoretical but should be treated seriously given the CVSS rating and potential impact on service continuity.

Mitigation Recommendations

1. Avoid using vulnerable Async versions (<= 2.6.4 and <= 3.2.5) in production environments, especially where input sources cannot be fully trusted. 2. Monitor official Async library repositories and security advisories for patches or updates addressing this vulnerability and apply them promptly once available. 3. Implement input validation and sanitization to restrict or sanitize inputs reaching the autoinject function to prevent maliciously crafted regex payloads. 4. Employ runtime resource limits such as CPU timeouts or regex execution timeouts to mitigate potential ReDoS impact. 5. Use Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) to detect and block suspicious input patterns targeting regex parsing. 6. Conduct code reviews and security testing focusing on regex usage in your codebase to identify and remediate similar ReDoS risks. 7. Consider isolating or sandboxing components that use vulnerable regexes to limit the blast radius of potential DoS attacks. 8. Maintain comprehensive monitoring and alerting on service performance metrics to detect early signs of DoS conditions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c86b7ef31ef0b565dc7

Added to database: 2/25/2026, 9:41:26 PM

Last enriched: 2/28/2026, 4:21:15 AM

Last updated: 4/12/2026, 3:46:03 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses