Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45773: Use After Free (CWE-416) in Facebook Facebook Thrift

0
High
VulnerabilityCVE-2024-45773cvecve-2024-45773cwe-416
Published: Fri Sep 27 2024 (09/27/2024, 13:49:54 UTC)
Source: CVE Database V5
Vendor/Project: Facebook
Product: Facebook Thrift

Description

A use-after-free vulnerability involving upgradeToRocket requests can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2024.09.09.00.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:20:12 UTC

Technical Analysis

CVE-2024-45773 is a use-after-free vulnerability classified under CWE-416 affecting Facebook Thrift, a software framework used for scalable cross-language services development. The vulnerability arises specifically when handling upgradeToRocket requests, which improperly manage memory, leading to use-after-free conditions. This flaw can cause the affected application to crash or, more critically, allow an attacker to execute arbitrary code remotely. The vulnerability affects all versions of Facebook Thrift prior to v2024.09.09.00. Exploitation requires network access and low privileges but does not require user interaction, increasing the risk of automated attacks. The CVSS v3.1 score of 7.5 indicates a high-severity issue with network attack vector, high impact on confidentiality, integrity, and availability, and a requirement for low privileges but high attack complexity. No public exploits or active exploitation have been reported yet, but the potential for remote code execution makes this a significant threat. Facebook Thrift is widely used internally at Facebook and by other organizations for RPC communication, meaning that vulnerable deployments could be targeted to disrupt services or gain unauthorized access. The lack of available patches at the time of reporting necessitates immediate attention to upgrade once available and implement interim mitigations.

Potential Impact

The vulnerability poses a high risk to organizations using Facebook Thrift, as it can lead to remote code execution, allowing attackers to compromise affected systems fully. This can result in unauthorized data access, manipulation, service disruption, or lateral movement within networks. The use-after-free condition can also cause application crashes, leading to denial of service. Given Facebook Thrift's role in enabling scalable service communication, exploitation could impact critical backend infrastructure, affecting service availability and data integrity. Organizations relying on Facebook Thrift for internal or external services may face operational disruptions and potential data breaches. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits rapidly. The vulnerability's network attack vector and no user interaction required make it suitable for remote exploitation, increasing the scope and ease of attack.

Mitigation Recommendations

Organizations should immediately plan to upgrade Facebook Thrift to version 2024.09.09.00 or later once the patch is available. Until then, restrict network access to services using Facebook Thrift, especially limiting exposure of upgradeToRocket request handling endpoints to trusted networks only. Employ network segmentation and firewall rules to minimize attack surface. Monitor logs and network traffic for unusual upgradeToRocket request patterns or crashes indicative of exploitation attempts. Conduct thorough code audits and memory management reviews in custom implementations of Thrift to identify similar use-after-free risks. Implement runtime protections such as memory safety tools (e.g., AddressSanitizer) in development and testing environments to detect use-after-free conditions early. Maintain up-to-date intrusion detection and prevention systems with signatures for this vulnerability once available. Finally, ensure incident response plans include procedures for rapid containment and remediation of memory corruption exploits.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
facebook
Date Reserved
2024-09-07T13:20:18.820Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cf1b7ef31ef0b56a60f

Added to database: 2/25/2026, 9:43:13 PM

Last enriched: 2/26/2026, 8:20:12 AM

Last updated: 4/11/2026, 5:57:14 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses